From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security.
Charles WeirBen HermannSascha FahlPublished in: USENIX Security Symposium (2020)
Keyphrases
- security requirements
- security issues
- security level
- functional requirements
- key management
- security measures
- security mechanisms
- mobile applications
- security management
- information security
- mobile apps
- security analysis
- security properties
- cryptographic protocols
- security protocols
- data security
- encryption scheme
- integrity verification
- security architecture
- user authentication
- access control
- security patterns
- data encryption
- key agreement protocol
- stream cipher
- public key encryption
- sensitive data
- key distribution
- key exchange
- intrusion detection
- security services
- development process
- authentication protocol
- case study
- electronic voting
- smart card
- mobile agent system
- security model
- key agreement
- android platform
- key establishment
- wireless sensor networks
- key exchange protocol
- web applications
- digital rights management
- security policies
- third party
- diffie hellman
- identity management
- trusted computing
- coverage includes
- secure routing
- authentication mechanism
- secure communication
- human operators
- software development
- electronic payment
- source code
- cloud computing
- public key
- social networking
- rfid systems