Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs

被引:16
|
作者
Gorski, Peter Leo [1 ]
Acar, Yasemin [2 ]
Lo Iacono, Luigi [1 ]
Fahl, Sascha [2 ]
机构
[1] TH Koln Univ Appl Sci, Cologne, Germany
[2] Leibniz Univ Hannover, Hannover, Germany
关键词
security warning design; focus groups; participatory design; cryptographic APIs; developer console; software development;
D O I
10.1145/3313831.3376142
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The positive effect of security information communicated to developers through API warnings has been established. However, current prototypical designs are based on security warnings for end-users. To improve security feedback for developers, we conducted a participatory design study with 25 professional software developers in focus groups. We identify which security information is considered helpful in avoiding insecure cryptographic API use during development. Concerning console messages, participants suggested five core elements, namely message classification, title message, code location, link to detailed external resources, and color. Design guidelines for end-user warnings are only partially suitable in this context. Participants emphasized the importance of tailoring the detail and content of security information to the context. Console warnings call for concise communication; further information needs to be linked externally. Therefore, security feedback should transcend tools and should be adjustable by software developers across development tools, considering the work context and developer needs.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Design and analysis of optimization algorithms to minimize cryptographic processing in BGP security protocols
    Sriram, Vinay K.
    Montgomery, Doug
    [J]. COMPUTER COMMUNICATIONS, 2017, 106 : 75 - 85
  • [32] A Mixed-Methods Study of Security Practices of Smart Contract Developers
    Sharma, Tanusree
    Zhou, Zhixuan
    Miller, Andrew
    Wang, Yang
    [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 2545 - 2562
  • [33] Fast and automatic security test on cryptographic ICs against fault injection attacks based on design for security test
    Shao, Cuiping
    Li, Huiyun
    Zhou, Jianbin
    [J]. IET INFORMATION SECURITY, 2017, 11 (06) : 312 - 318
  • [34] Security-typed languages for implementation of cryptographic protocols: A case study
    Askarov, A
    Sabelfeld, A
    [J]. COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 197 - 221
  • [35] Predicting New Attacks: A Case Study in Security Analysis of Cryptographic Protocols
    Bao, Da
    Wagatsuma, Kazunori
    Gao, Hongbiao
    Cheng, Jingde
    [J]. ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 263 - 270
  • [36] Point-and-Shoot Security Design: Can We Build Better Tools for Developers?
    Tuerpe, Sven
    [J]. PROCEEDINGS OF THE 2012 NEW SECURITY PARADIGMS WORKSHOP (NSPW'12), 2012, : 27 - 41
  • [37] Cryptographic core design security verification and vulnerability detection based on information flow analysis
    Ma, Yixin
    Tang, Shibo
    Tan, Jing
    Li, Xuefei
    Hu, Wei
    [J]. Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University, 2022, 40 (01): : 76 - 83
  • [38] On the Recruitment of Company Developers for Security Studies: Results from a Qualitative Interview Study
    Serafini, Raphael
    Gutfleisch, Marco
    Horstmann, Stefan Albert
    Naiakshina, Alena
    [J]. PROCEEDINGS OF THE NINETEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY, SOUPS 2023, 2023, : 321 - 340
  • [39] The influence of subjective value on mobile payment security warnings: An eye movement study
    Du, Yufei
    Yang, Haibo
    [J]. DISPLAYS, 2024, 82
  • [40] Preliminary Findings on FOSS Dependencies and Security A Qualitative Study on Developers' Attitudes and Experience
    Pashchenko, Ivan
    Vu, Duc-Ly
    Massacci, Fabio
    [J]. 2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2020), 2020, : 284 - 285