2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE) 2021
DOI: 10.1109/icse43902.2021.00053
|View full text |Cite
|
Sign up to set email alerts
|

“Do this! Do that!, and Nothing will Happen” Do Specifications Lead to Securely Stored Passwords?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(19 citation statements)
references
References 41 publications
0
19
0
Order By: Relevance
“…Developers with adequate experience and support are able to detect improper inputs with proper priming [63]. The importance of priming has also been observed in [29], [41]. The empirical studies report that developers with education performs better be it for secure uses of APIs or to detect insecure uses through the interventions [15], [48], [73].…”
Section: B Effect Of Tropes On Interventionsmentioning
confidence: 95%
See 2 more Smart Citations
“…Developers with adequate experience and support are able to detect improper inputs with proper priming [63]. The importance of priming has also been observed in [29], [41]. The empirical studies report that developers with education performs better be it for secure uses of APIs or to detect insecure uses through the interventions [15], [48], [73].…”
Section: B Effect Of Tropes On Interventionsmentioning
confidence: 95%
“…The security is easy trope arises from a belief that developers are aware of the extent to which their code is insecure. Two studies found that developers are overconfident in the security of their code [29], [41]. Oltrogge et al found that app generators routinely generated insecure apps [1].…”
Section: A Tropesmentioning
confidence: 99%
See 1 more Smart Citation
“…Weak password checks is one of the top OWASP vulnerabilities and, despite implementing secure password storage, information of users with weak passwords can be hacked easily via sophisticated technologies. Developers' security engagement when working with passwords is often assessed in terms of how developers store passwords, for example in the work of Naiakshina et al [22] and Hallet et al [14]. Implementation of strong password checks is also a recommended OWASP practice which is often overlooked.…”
Section: Issues With Security Knowledgementioning
confidence: 99%
“…They found that short term memory, memory span and episodic memory had no effect on solving the puzzles. Other works that touch on psychology in security include Hallett et al (2021) [12], where boosting security awareness through requiring planning promoted a small effect on security, and Shreeve et al (2020) [19] who identified decision making processes related to cybersecurity.…”
Section: Phase Twomentioning
confidence: 99%