Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

How Internet Resources Might Be Helping You Develop Faster but Less Securely

Published: 01 April 2017 Publication History

Abstract

In this experimental study, Android developers using Stack Overflow to solve common security issues were more likely to produce functional--but less secure--code. Given today's time constraints and economic pressures, developers need improved official documentation that's both secure and usable.

References

[1]
E. Chin, “Analyzing Inter-application Communication in Android,” in Proc. 9th Int'l Conf. Mobile Systems, Applications, and Services (MobiSys 11), 2011, pp. 239–252.
[2]
M. Egele, “An Empirical Study of Cryptographic Misuse in Adroid Applications,” in Proc. ACM SIGSAC Conf. Computer and Communications Security (CCS 13), 2013, pp. 73–84.
[3]
S. Fahl, “Why Eve and Mallory Love Android: An Analysis of Android SSL (In)Security,” in Proc. ACM Conf. Computer and Communications Security (CCS 12), 2012, pp. 50–61.
[4]
A.P. Felt, “Android Permissions Demystified,” in Proc. 18th ACM Conf. Computer and Communications Security (CCS 11), 2011, pp. 627–638.
[5]
M. Georgiev, “The Most Dangerous Code in the World: Validating SSL Certificates in Non-browser Software,” in Proc. ACM Conf. Computer and Communications Security (CCS 12), 2012, pp. 38–49.
[6]
B. Reaves, “Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World,” in Proc. 24th USENIX Conf. Security Symp. (USENIX Sec 15), 2015, pp. 17–32.
[7]
S. Komatineni and D. MacLean, Pro Android 4, Apress, 2012.
[8]
N. Elenkov, Android Security Internals, No Starch Press, 2015.
[9]
S. Nadi, “Jumping through Hoops: Why Do Java Developers Struggle with Cryptography APIs?,” in Proc. 38th Int'l Conf. Software Eng. (ICSE 16), 2016, pp. 935–946.
[10]
W. Wang and M.W. Godfrey, “Detecting API Usage Obstacles: A Study of iOS and Android Developer Questions,” in Proc. 10th Working Conf. Mining Software Repositories (MSR 13), 2013, pp. 61–64.
[11]
W. Wang, H. Malik, and M.W. Godfrey, “Recommending Posts Concerning API Issues in Developer Q&A Sites,” Proc. 12th Working Conf. Mining Software Repositories (MSR 15), 2015, pp. 224–234.

Cited By

View all
  • (2024)Using AI Assistants in Software Development: A Qualitative Study on Security Practices and ConcernsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690283(2726-2740)Online publication date: 2-Dec-2024
  • (2023)An Analysis of Stack Exchange Questions: Identifying Challenges in Software Design and Development with a Focus on Data Privacy and Data ProtectionProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605465(1-7)Online publication date: 29-Aug-2023
  • (2023)"Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure AuthenticationProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623072(2740-2754)Online publication date: 15-Nov-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Security and Privacy
IEEE Security and Privacy  Volume 15, Issue 2
April 2017
95 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 April 2017

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Using AI Assistants in Software Development: A Qualitative Study on Security Practices and ConcernsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690283(2726-2740)Online publication date: 2-Dec-2024
  • (2023)An Analysis of Stack Exchange Questions: Identifying Challenges in Software Design and Development with a Focus on Data Privacy and Data ProtectionProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605465(1-7)Online publication date: 29-Aug-2023
  • (2023)"Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure AuthenticationProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623072(2740-2754)Online publication date: 15-Nov-2023
  • (2023)Blindspots in Python and Java APIs Result in Vulnerable CodeACM Transactions on Software Engineering and Methodology10.1145/357185032:3(1-31)Online publication date: 26-Apr-2023
  • (2023)Simple stupid insecure practices and GitHub’s code searchJournal of Systems and Software10.1016/j.jss.2023.111698202:COnline publication date: 1-Aug-2023
  • (2022)Let's hashProceedings of the Eighteenth USENIX Conference on Usable Privacy and Security10.5555/3563609.3563636(503-522)Online publication date: 8-Aug-2022
  • (2022)Usability and security of trusted platform module (TPM) library APIsProceedings of the Eighteenth USENIX Conference on Usable Privacy and Security10.5555/3563609.3563621(213-232)Online publication date: 8-Aug-2022
  • (2022)Client-Side Hashing for Efficient Typo-Tolerant Password CheckersInternational Journal of Systems and Software Security and Protection10.4018/IJSSSP.30262213:1(1-24)Online publication date: 13-Jul-2022
  • (2022)Privacy, Permissions, and the Health App Ecosystem: A Stack Overflow ExplorationProceedings of the 2022 European Symposium on Usable Security10.1145/3549015.3555669(117-130)Online publication date: 29-Sep-2022
  • (2022)CopypastaVulGuard – A browser extension to prevent copy and paste spreading of vulnerable source code in forum postsProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3538973(1-8)Online publication date: 23-Aug-2022
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media