Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs

被引:16
|
作者
Gorski, Peter Leo [1 ]
Acar, Yasemin [2 ]
Lo Iacono, Luigi [1 ]
Fahl, Sascha [2 ]
机构
[1] TH Koln Univ Appl Sci, Cologne, Germany
[2] Leibniz Univ Hannover, Hannover, Germany
关键词
security warning design; focus groups; participatory design; cryptographic APIs; developer console; software development;
D O I
10.1145/3313831.3376142
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The positive effect of security information communicated to developers through API warnings has been established. However, current prototypical designs are based on security warnings for end-users. To improve security feedback for developers, we conducted a participatory design study with 25 professional software developers in focus groups. We identify which security information is considered helpful in avoiding insecure cryptographic API use during development. Concerning console messages, participants suggested five core elements, namely message classification, title message, code location, link to detailed external resources, and color. Design guidelines for end-user warnings are only partially suitable in this context. Participants emphasized the importance of tailoring the detail and content of security information to the context. Console warnings call for concise communication; further information needs to be linked externally. Therefore, security feedback should transcend tools and should be adjustable by software developers across development tools, considering the work context and developer needs.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Developers Deserve Security Warnings, Too On the Effect of Integrated Security Advice on Cryptographic API Misuse
    Gorski, Peter Leo
    Lo Iacono, Luigi
    Wermke, Dominik
    Stransky, Christian
    Moeller, Sebastian
    Acar, Yasemin
    Fahl, Sascha
    [J]. PROCEEDINGS OF THE FOURTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY, 2018, : 265 - 280
  • [2] Developers Are Not the Enemy! The Need for Usable Security APIs
    Green, Matthew
    Smith, Matthew
    [J]. IEEE SECURITY & PRIVACY, 2016, 14 (05) : 40 - 46
  • [3] The design of a cryptographic security architecture
    Gutmann, P
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 153 - 168
  • [4] SECURITY FEATURES COMPARISON OF MASTER KEY AND IKM CRYPTOGRAPHIC KEY MANAGEMENT FOR RESEARCHERS AND DEVELOPERS
    Yazdanpanah, Saeed
    Chaeikar, Saman Shojae
    Zamani, Mazdak
    Kourdi, Reza
    [J]. PROCEEDINGS OF THE 2011 3RD INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING (ICSTE 2011), 2011, : 365 - 369
  • [5] Design for Security Test on Cryptographic ICs for Design-Time Security Evaluation
    Shao, Cuiping
    Li, Huiyun
    Xu, Guoqing
    Hu, Xiaobo
    [J]. 2014 9TH INTERNATIONAL DESIGN & TEST SYMPOSIUM (IDT), 2014, : 118 - 123
  • [6] How Do Developers Use APIs? A Case Study in Concurrency
    Blom, Stefan
    Kiniry, Joseph
    Huisman, Marieke
    [J]. 2013 18TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS), 2013, : 212 - 221
  • [7] Are Developers Equally Concerned About Making Their APIs RESTful and the Linguistic Quality? A Study on Google APIs
    Palma, Francis
    Zarraa, Osama
    Sadia, Ahmad
    [J]. SERVICE-ORIENTED COMPUTING (ICSOC 2021), 2021, 13121 : 171 - 187
  • [8] Design of a Cryptographic Tamper Detection Scheme for Network Security
    Rao, B. Srinivasa
    Prasad, S. D. V.
    [J]. ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 214 - 224
  • [9] A Comparative Study of Cryptographic Algorithms for Cloud Security
    Yusufzai, Asifkhan
    Ranpara, Ripal
    Vora, Mital
    Kumbharana, C. K.
    [J]. EMERGING TRENDS IN EXPERT APPLICATIONS AND SECURITY, 2019, 841 : 409 - 415
  • [10] Investigate How Developers and Managers View Security Design in Software
    Imran, Asif
    [J]. PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, ENASE 2023, 2023, : 693 - 700