An empirical study of static analysis tools for secure code review

W Charoenwet, P Thongtanunam, VT Pham… - Proceedings of the 33rd …, 2024 - dl.acm.org
Early identification of security issues in software development is vital to minimize their
unanticipated impacts. Code review is a widely used manual analysis method that aims to …

[HTML][HTML] Decoding developer password patterns: A comparative analysis of password extraction and selection practices

N Lykousas, C Patsakis - Computers & Security, 2024 - Elsevier
Passwords play a crucial role in authentication, ensuring that only authorised entities can
access sensitive information. However, user password choices are often weak and …

Software security during modern code review: the developer's perspective

L Braz, A Bacchelli - Proceedings of the 30th ACM Joint European …, 2022 - dl.acm.org
To avoid software vulnerabilities, organizations are shifting security to earlier stages of the
software development, such as at code review time. In this paper, we aim to understand the …

Less is more: supporting developers in vulnerability detection during code review

L Braz, C Aeberhard, G Çalikli, A Bacchelli - Proceedings of the 44th …, 2022 - dl.acm.org
Reviewing source code from a security perspective has proven to be a difficult task. Indeed,
previous research has shown that developers often miss even popular and easy-to-detect …

What improves developer productivity at google? code quality

L Cheng, E Murphy-Hill, M Canning, C Jaspan… - Proceedings of the 30th …, 2022 - dl.acm.org
Understanding what affects software developer productivity can help organizations choose
wise investments in their technical and social environment. But the research literature either …

Developers are neither enemies nor users: they are collaborators

PD Chowdhury, J Hallett, N Patnaik… - 2021 IEEE Secure …, 2021 - ieeexplore.ieee.org
Developers struggle to program securely. Prior works have reviewed the methods used to
run user-studies with developers, systematized the ancestry of security API usability …

[HTML][HTML] Survey of techniques to detect common weaknesses in program binaries

A Adhikari, P Kulkarni - Cyber Security and Applications, 2025 - Elsevier
Software vulnerabilities resulting from coding weaknesses and poor development practices
are common. Attackers can exploit these vulnerabilities and impact the security and privacy …

First come first served: The impact of file position on code review

E Fregnan, L Braz, M D'Ambros, G Çalıklı… - Proceedings of the 30th …, 2022 - dl.acm.org
The most popular code review tools (eg, Gerrit and GitHub) present the files to review sorted
in alphabetical order. Could this choice or, more generally, the relative position in which a …

Tales from the Git: Automating the detection of secrets on code and assessing developers' passwords choices

N Lykousas, C Patsakis - 2023 IEEE European Symposium on …, 2023 - ieeexplore.ieee.org
Typical users are known to use and reuse weak passwords. Yet, as cybersecurity concerns
continue to rise, understanding the password practices of software developers becomes …

Measuring developers' web security awareness from attack and defense perspectives

M Sahin, T Ünlü, C Hébert, LA Shepherd… - 2022 IEEE Security …, 2022 - ieeexplore.ieee.org
Web applications are the public-facing components of information systems, which makes
them an easy entry point for various types of attacks. While it is often the responsibility of …