Proceedings of the 2014 New Security Paradigms Workshop 2014
DOI: 10.1145/2683467.2683472
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerabilities as Blind Spots in Developer's Heuristic-Based Decision-Making Processes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(17 citation statements)
references
References 37 publications
0
7
0
Order By: Relevance
“…To this end, [17] outlined an agenda towards understanding developer's attitude, available security development tools, and proposing design suggestions to support developers in building secure applications. There was frequently cited research on developer's lack of security education [18] and security thinking during writing code [19], which was perceived as the reason for different software vulnerabilities. The assumption was that if developers have learned about security, they could better avoid vulnerabilities [20].…”
Section: User Studies Of Security Practicesmentioning
confidence: 99%
“…To this end, [17] outlined an agenda towards understanding developer's attitude, available security development tools, and proposing design suggestions to support developers in building secure applications. There was frequently cited research on developer's lack of security education [18] and security thinking during writing code [19], which was perceived as the reason for different software vulnerabilities. The assumption was that if developers have learned about security, they could better avoid vulnerabilities [20].…”
Section: User Studies Of Security Practicesmentioning
confidence: 99%
“…Cappos et al [28] proposed that software vulnerabilities are a blindspot in developers' heuristic-based decision making mental models. Oliveira et al [65] further showed that security is not a priority in the developers' mindsets while coding; however, that developers do adopt a security mindset once primed about the topic.…”
Section: Related Workmentioning
confidence: 99%
“…Mapping requirements to proper API usage protocols, understanding API side effects, and even deciding between differing expert opinions on API use all pose challenges [44], [74], [75]. Developers misunderstanding APIs is frequently the cause of security vulnerabilities [28], [33], [73].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…From a security-by-design point of view, one may search for known types of vulnerabilities, but it is hard to find the unknown ones, those that transcend existing (cultural) classification systems [4,6,34]. In such a context, complete design-time security may be impossible due to the limitations of human perception and imagination.…”
Section: Advantages Of the Paradigmmentioning
confidence: 99%