2022 IEEE Symposium on Security and Privacy (SP) 2022
DOI: 10.1109/sp46214.2022.9833686
|View full text |Cite
|
Sign up to set email alerts
|

Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 75 publications
0
8
0
Order By: Relevance
“…In the mobile context, ransomware mitigation strategies leveraged unique aspects of mobile operating systems, such as application sandboxing and stricter app store policies [21,7,22]. Efforts were primarily concentrated on preventing the installation of malicious apps through vetted app store mechanisms and using mobile security solutions that monitored for suspicious behaviors [22,23]. However, these strategies often fell short in environments where users could bypass standard security measures through activities like jailbreaking or installing apps from unofficial sources, thus exposing devices to ransomware risks [24,25].…”
Section: Ransomware Mitigation On Mobile Devicesmentioning
confidence: 99%
“…In the mobile context, ransomware mitigation strategies leveraged unique aspects of mobile operating systems, such as application sandboxing and stricter app store policies [21,7,22]. Efforts were primarily concentrated on preventing the installation of malicious apps through vetted app store mechanisms and using mobile security solutions that monitored for suspicious behaviors [22,23]. However, these strategies often fell short in environments where users could bypass standard security measures through activities like jailbreaking or installing apps from unofficial sources, thus exposing devices to ransomware risks [24,25].…”
Section: Ransomware Mitigation On Mobile Devicesmentioning
confidence: 99%
“…They used a novel extracting method and analysed registered metadata in repositories such as commits and xes that were used for the maintenance of the projects. Wermke et al [21] conducted interviews with 27 people who were involved in the maintenance of open source projects and analysesd their practices for security and trust.…”
Section: Static Code Analysismentioning
confidence: 99%
“…Transparency and accountability are next established in OSS projects, requesting that code reviews and decision-making procedures be conducted transparently. Thus, people are made trustful and work together, which is a community-enhancing factor [8]. Governance structures form one of the most important pillars of sustainable enterprises that ensure compliance with set standards, aid in exchanging ideas, and efficiently use resources to integrate safety measures in their management practices [3].…”
Section: Framework Formulationmentioning
confidence: 99%
“…Encouraging cooperation and knowledge transfer among the community members is essential to the formation of a culture of data mutual understanding and shared responsibility for one another. Opensource projects should allow for the collaborative exchange of methods that have worked, security guides, and threat data [8].…”
Section: Policy Recommendationsmentioning
confidence: 99%