[HTML][HTML] Challenges with developing secure mobile health applications: Systematic review

B Aljedaani, MA Babar - JMIR mHealth and uHealth, 2021 - mhealth.jmir.org
Background: Mobile health (mHealth) apps have gained significant popularity over the last
few years due to their tremendous benefits, such as lowering health care costs and …

Privacy champions in software teams: Understanding their motivations, strategies, and challenges

M Tahaei, A Frik, K Vaniea - Proceedings of the 2021 CHI Conference …, 2021 - dl.acm.org
Software development teams are responsible for making and implementing software design
decisions that directly impact end-user privacy, a challenging task to do well. Privacy …

Freely given consent? studying consent notice of third-party tracking and its violations of gdpr in android apps

TT Nguyen, M Backes, B Stock - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Adopted in May 2018, the European Union's General Data Protection Regulation (GDPR)
requires the consent for processing users' personal data to be freely given, specific …

Developers say the darnedest things: Privacy compliance processes followed by developers of child-directed apps

N Alomar, S Egelman - Proceedings on Privacy Enhancing …, 2022 - petsymposium.org
We investigate the privacy compliance processes followed by developers of child-directed
mobile apps. While children's online privacy laws have existed for decades in the US, prior …

Share First, Ask Later (or Never?) Studying Violations of {GDPR's} Explicit Consent in Android Apps

TT Nguyen, M Backes, N Marnau, B Stock - 30th USENIX Security …, 2021 - usenix.org
Since the General Data Protection Regulation (GDPR) went into effect in May 2018, online
services are required to obtain users' explicit consent before sharing users' personal data …

{“Security} is not my field,{I'm} a stats {guy”}: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry

J Mink, H Kaur, J Schmüser, S Fahl, Y Acar - 32nd USENIX Security …, 2023 - usenix.org
Adversarial machine learning (AML) has the potential to leak training data, force arbitrary
classifications, and greatly degrade overall performance of machine learning models, all of …

How does usable security (not) end up in software products? results from a qualitative interview study

M Gutfleisch, JH Klemmer, N Busch… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
For software to be secure in practice, users need to be willing and able to appropriately use
security features. These features are usually implemented by software professionals during …

Why eve and mallory still love android: Revisiting {TLS}({In) Security} in android applications

M Oltrogge, N Huaman, S Klivan, Y Acar… - 30th USENIX Security …, 2021 - usenix.org
Android applications have a long history of being vulnerable to man-in-the-middle attacks
due to insecure custom TLS certificate validation implementations. To resolve this, Google …

Where to recruit for security development studies: Comparing six software developer samples

H Kaur, S Klivan, D Votipka, Y Acar, S Fahl - 31st USENIX Security …, 2022 - usenix.org
Studying developers is an important aspect of usable security and privacy research. In
particular, studying security development challenges such as the usability of security APIs …

[HTML][HTML] Taxonomy of security weaknesses in Java and Kotlin Android apps

A Mazuera-Rozo, C Escobar-Velásquez… - Journal of systems and …, 2022 - Elsevier
Android is nowadays the most popular operating system in the world, not only in the realm of
mobile devices, but also when considering desktop and laptop computers. Such a popularity …