Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse.
Peter Leo GorskiLuigi Lo IaconoDominik WermkeChristian StranskySebastian MöllerYasemin AcarSascha FahlPublished in: SOUPS @ USENIX Security Symposium (2018)
Keyphrases
- information security
- security issues
- security policies
- security properties
- security protocols
- open source
- key management
- access control
- statistical databases
- encryption key
- stream cipher
- security analysis
- source code
- data security
- network security
- intrusion detection
- elliptic curve cryptography
- software development
- personal data
- security systems
- cryptographic protocols
- low cost
- high assurance
- encryption scheme
- security requirements
- countermeasures
- oracle database