[PDF][PDF] “These results must be false”: A usability evaluation of constant-time analysis tools

M Fourné, DDA Braga, J Jancar, M Sabt… - 33th USENIX Security …, 2024 - usenix.org
Cryptography secures our online interactions, transactions, and trust. To achieve this goal,
not only do the cryptographic primitives and protocols need to be secure in theory, they also …

Secure Cryptography Usage in Software Development: A Systematic Literature Review

BJ Hernández-Marcial, X Limón… - 2024 12th …, 2024 - ieeexplore.ieee.org
Cryptography plays a significant role in software engineering, its application is paramount
for the security of software systems. However, comprehending and securely utilizing …

Less Is More: A Mixed-Methods Study on Security-Sensitive API Calls in Java for Better Dependency Selection

I Rahman, R Paramitha, H Plate, D Wermke… - arXiv preprint arXiv …, 2024 - arxiv.org
Security sensitive APIs provide access to security-sensitive resources, eg, the filesystem or
network resources. Including such API calls--directly or through dependencies--increases …

[PDF][PDF] Human Factors in Open Source Security

M Fourné - 2024 - marcelfourne.de
Software security research has begun to formalize attacks and defenses against commonly
deployed software, even the most optimized cryptography [38]. Newer programming …