You are not your developer, either: A research agenda for usable security and privacy research beyond end users

Y Acar, S Fahl, ML Mazurek - 2016 IEEE Cybersecurity …, 2016 - ieeexplore.ieee.org
While researchers have developed many tools, techniques, and protocols for improving
software security, exploits and breaches are only becoming more frequent. Some of this gap …

Stack overflow considered harmful? the impact of copy&paste on android application security

F Fischer, K Böttinger, H Xiao… - … IEEE symposium on …, 2017 - ieeexplore.ieee.org
Online programming discussion platforms such as Stack Overflow serve as a rich source of
information for software developers. Available information include vibrant discussions and …

You get where you're looking for: The impact of information sources on code security

Y Acar, M Backes, S Fahl, D Kim… - … IEEE symposium on …, 2016 - ieeexplore.ieee.org
Vulnerabilities in Android code--including but not limited to insecure data storage,
unprotected inter-component communication, broken TLS implementations, and violations of …

Keeping authorities" honest or bust" with decentralized witness cosigning

E Syta, I Tamas, D Visher, DI Wolinsky… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
The secret keys of critical network authorities--such as time, name, certificate, and software
update services--represent high-value targets for hackers, criminals, and spy agencies …

Revisiting software ecosystems research: A longitudinal literature study

K Manikas - Journal of Systems and Software, 2016 - Elsevier
Abstract 'Software ecosystems' is argued to first appear as a concept more than 10 years
ago and software ecosystem research started to take off in 2010. We conduct a systematic …

A systematic mapping study on requirements engineering in software ecosystems

A Vegendla, AN Duc, S Gao, G Sindre - Journal of Information …, 2018 - igi-global.com
Software ecosystems (SECOs) and open innovation processes have been claimed as a way
forward for the software industry. A proper understanding of requirements is as important for …

{CHAINIAC}: Proactive {Software-Update} transparency via collectively signed skipchains and verified builds

K Nikitin, E Kokoris-Kogias, P Jovanovic… - 26th USENIX Security …, 2017 - usenix.org
Software-update mechanisms are critical to the security of modern systems, but their
typically centralized design presents a lucrative and frequently attacked target. In this work …

A large scale investigation of obfuscation use in google play

D Wermke, N Huaman, Y Acar, B Reaves… - Proceedings of the 34th …, 2018 - dl.acm.org
Android applications are frequently plagiarized or repackaged, and software obfuscation is a
recommended protection against these practices. However, there is very little data on the …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

Sok: Lessons learned from android security research for appified software platforms

Y Acar, M Backes, S Bugiel, S Fahl… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Android security and privacy research has boomed in recent years, far outstripping
investigations of other appified platforms. However, despite this attention, research efforts …