Abstract:Existing research has shown that developers will use StackOverflow to answer programming questions: but what draws them to one particular answer over any other? The choice of answer they select can mean the difference between a secure application and insecure one, as the quality of supposedly secure answers can vary. Prior work has studied people posting on Stack Overflow-a two-way communication between the original poster and the Stack Overflow community. Instead, we study the situation of one-way communicati… Show more
“…If a developer struggles to understand how to use an API correctly (the miscommunication challenge in Table I), they may search Stack Overflow for solutions. The answers to Stack Overflow questions are voted and this may create herding behaviors (Table II), regardless of whether the answer they follow is correct or not [42]. The intangibility challenge represents a challenge with security as a whole, rather than being specific to any particular development practice.…”
Section: Challenges and Consequent Behaviorsmentioning
confidence: 99%
“…Van der Linden et al conduct an observation of developer's use of Stack Overflow with 1,188 participants. They found developers go by surface features of Stack Overflow posts (such as answer length) over correctness [42]. Hidden information has a bearing on our characterization of shifting responsibility.…”
“…• Prior Beliefs -Developers exhibit a tendency to bring their own privacy and security beliefs into their development process. [2], [4], [10], [27], [28], [42], [43], [45], [46], [49], [52], [53] Herding…”
Section: Biasmentioning
confidence: 99%
“…The incentives for inducing developers to spend the effort to program securely are also not aligned with expected returns from doing so [28], [48]. The challenges result in bias and group behavior [42], [52]. The improvisations to which developers resort are aided by online sources which can be insecure [43], [52], [59].…”
Section: Table III Describes Four Classes Of Interventions Proposed Tomentioning
Developers struggle to program securely. Prior works have reviewed the methods used to run user-studies with developers, systematized the ancestry of security API usability recommendations, and proposed research agendas to help understand developers' knowledge, attitudes towards security and priorities. In contrast we study the research to date and abstract out categories of challenges, behaviors and interventions from the results of developer-centered studies. We analyze the abstractions and identify five misplaced beliefs or tropes about developers embedded in the core design of APIs and tools. These tropes hamper the effectiveness of interventions to help developers program securely. Increased collaboration between developers, security experts and API designers to help developers understand the security assumptions of APIs alongside creating new useful abstractions-derived from such collaborations-will lead to systems with better security.
“…If a developer struggles to understand how to use an API correctly (the miscommunication challenge in Table I), they may search Stack Overflow for solutions. The answers to Stack Overflow questions are voted and this may create herding behaviors (Table II), regardless of whether the answer they follow is correct or not [42]. The intangibility challenge represents a challenge with security as a whole, rather than being specific to any particular development practice.…”
Section: Challenges and Consequent Behaviorsmentioning
confidence: 99%
“…Van der Linden et al conduct an observation of developer's use of Stack Overflow with 1,188 participants. They found developers go by surface features of Stack Overflow posts (such as answer length) over correctness [42]. Hidden information has a bearing on our characterization of shifting responsibility.…”
“…• Prior Beliefs -Developers exhibit a tendency to bring their own privacy and security beliefs into their development process. [2], [4], [10], [27], [28], [42], [43], [45], [46], [49], [52], [53] Herding…”
Section: Biasmentioning
confidence: 99%
“…The incentives for inducing developers to spend the effort to program securely are also not aligned with expected returns from doing so [28], [48]. The challenges result in bias and group behavior [42], [52]. The improvisations to which developers resort are aided by online sources which can be insecure [43], [52], [59].…”
Section: Table III Describes Four Classes Of Interventions Proposed Tomentioning
Developers struggle to program securely. Prior works have reviewed the methods used to run user-studies with developers, systematized the ancestry of security API usability recommendations, and proposed research agendas to help understand developers' knowledge, attitudes towards security and priorities. In contrast we study the research to date and abstract out categories of challenges, behaviors and interventions from the results of developer-centered studies. We analyze the abstractions and identify five misplaced beliefs or tropes about developers embedded in the core design of APIs and tools. These tropes hamper the effectiveness of interventions to help developers program securely. Increased collaboration between developers, security experts and API designers to help developers understand the security assumptions of APIs alongside creating new useful abstractions-derived from such collaborations-will lead to systems with better security.
“…For instance, profiling developer expertise contributes to heightening the members' awareness about the reliability of responses [5] [6]. In particular, platforms such as Stack Overflow contain insecure code snippets and inexperienced developers blindly use such snippets [7]. Due to the lack of secure code examples in cryptography, we hypothesize that mapping the activity of top crypto developers cross-platform can provide an interesting path to find and evaluate their practices from the security perspective, and present such results for developers who are looking for reliable, secure crypto examples.…”
Previous studies have shown that developers regularly seek advice on online forums to resolve their cryptography issues. We investigated whether users who are active in cryptography discussions also use cryptography in practice. We collected the top 1% of responders who have participated in crypto discussions on Stack Overflow, and we manually analyzed their crypto contributions to open source projects on GitHub. We could identify 319 GitHub profiles that belonged to such crypto responders and found that 189 of them used cryptography in their projects. Further investigation revealed that the majority of analyzed users (i.e., 85%) use the same programming languages for crypto activity on Stack Overflow and crypto contributions on GitHub. Moreover, 90% of the analyzed users employed the same concept of cryptography in their projects as they advised about on Stack Overflow.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.