[HTML][HTML] Android mobile malware detection using machine learning: A systematic review

J Senanayake, H Kalutarage, MO Al-Kadri - Electronics, 2021 - mdpi.com
With the increasing use of mobile devices, malware attacks are rising, especially on Android
phones, which account for 72.2% of the total market share. Hackers try to attack …

[HTML][HTML] Challenges with develo** secure mobile health applications: systematic review

B Aljedaani, MA Babar - JMIR mHealth and uHealth, 2021 - mhealth.jmir.org
Background: Mobile health (mHealth) apps have gained significant popularity over the last
few years due to their tremendous benefits, such as lowering health care costs and …

The seven sins: Security smells in infrastructure as code scripts

A Rahman, C Parnin, L Williams - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
Practitioners use infrastructure as code (IaC) scripts to provision servers and development
environments. While develo** IaC scripts, practitioners may inadvertently introduce …

Security in the software development lifecycle

H Assal, S Chiasson - Fourteenth symposium on usable privacy and …, 2018 - usenix.org
We interviewed developers currently employed in industry to explore real-life software
security practices during each stage of the development lifecycle. This paper explores steps …

'Think secure from the beginning' A Survey with Software Developers

H Assal, S Chiasson - Proceedings of the 2019 CHI conference on …, 2019 - dl.acm.org
Vulnerabilities persist despite existing software security initiatives and best practices. This
paper focuses on the human factors of software security, including human behaviour and …

Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects

S Rahaman, Y **ao, S Afrose, F Shaon, K Tian… - Proceedings of the …, 2019 - dl.acm.org
Cryptographic API misuses, such as exposed secrets, predictable random numbers, and
vulnerable certificate verification, seriously threaten software security. The vision of …

CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs

S Krüger, J Späth, K Ali, E Bodden… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Various studies have empirically shown that the majority of Java and Android applications
misuse cryptographic libraries, causing devastating breaches of data security. It is crucial to …

Using ai assistants in software development: A qualitative study on security practices and concerns

JH Klemmer, SA Horstmann, N Patnaik… - Proceedings of the …, 2024 - dl.acm.org
Following the recent release of AI assistants, such as OpenAI's ChatGPT and GitHub
Copilot, the software industry quickly utilized these tools for software development tasks, eg …

" False negative-that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing

AS Ami, K Moran, D Poshyvanyk… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
The demand for automated security analysis techniques, such as static analysis based
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …

Unhelpful assumptions in software security research

I Ryan, U Roedig, KJ Stol - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
In the study of software security many factors must be considered. Once venturing beyond
the simplest of laboratory experiments, the researcher is obliged to contend with …