Proceedings of the 40th International Conference on Software Engineering 2018
DOI: 10.1145/3180155.3180201
|View full text |Cite
|
Sign up to set email alerts
|

Secure coding practices in Java

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 106 publications
(14 citation statements)
references
References 23 publications
0
11
0
Order By: Relevance
“…Our data collection steps are in line with the best practices of previous work. Previous work uses Stack Overflow tags, coding questions, and manual analysis often to identify big data , concurrency , security [Meng et al 2018;Yang et al 2016], and deep learning [Islam et al , 2020 bugs and questions and answers. We write our code to process Stack Exchange Data Dump [Stack Exchange 2019] and its XML files to identify Akka actor and coding questions.…”
Section: Data Collectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Our data collection steps are in line with the best practices of previous work. Previous work uses Stack Overflow tags, coding questions, and manual analysis often to identify big data , concurrency , security [Meng et al 2018;Yang et al 2016], and deep learning [Islam et al , 2020 bugs and questions and answers. We write our code to process Stack Exchange Data Dump [Stack Exchange 2019] and its XML files to identify Akka actor and coding questions.…”
Section: Data Collectionmentioning
confidence: 99%
“…This is because these may not identify a complete set of Akka questions and answers and commits or identify irrelevant ones. To minimize this threat, we closely follow the best practices of previous work in using tags Islam et al , 2020Meng et al 2018;Yang et al 2016], keywords [Casalnuovo et al 2015;Islam et al , 2020Kim and Whitehead 2006;Ray et al 2016], and maturity criteria [Biswas et al 2019;Gu et al 2016;Nadi et al 2016]. Additionally, we manually analyze each candidate question and answer and commit and discard irrelevant ones.…”
Section: Threats To Validitymentioning
confidence: 99%
“…Meng et al 19 conducted an empirical study on Stack Overflow postings to learn about developers' fears about Java secure code, programming challenges, and insecure coding methods. According to the authors, Spring Security's authentication and authorization capabilities have been widely adopted.…”
Section: Motivation and Related Reviewmentioning
confidence: 99%
“…SSC standards establish protections that minimize or eliminate the possibility of code having security flaws. However, despite using SSC standards and practices, many cyber‐attacks are reported daily 18‐20 …”
Section: Introductionmentioning
confidence: 99%
“…2) Java Programming Language: This programming language is one of the most recognized, provides the development and execution of various types of applications, highlighted by its structure and composition for programming, especially for mobile applications containing high adaptability, aimed at different mobile devices [18]. The main advantages are that it is a simple to understand language, object-oriented language, distributed applications, and, finally, the security it provides [19] [20].…”
Section: Hu-10mentioning
confidence: 99%