Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs

被引:16
|
作者
Gorski, Peter Leo [1 ]
Acar, Yasemin [2 ]
Lo Iacono, Luigi [1 ]
Fahl, Sascha [2 ]
机构
[1] TH Koln Univ Appl Sci, Cologne, Germany
[2] Leibniz Univ Hannover, Hannover, Germany
关键词
security warning design; focus groups; participatory design; cryptographic APIs; developer console; software development;
D O I
10.1145/3313831.3376142
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The positive effect of security information communicated to developers through API warnings has been established. However, current prototypical designs are based on security warnings for end-users. To improve security feedback for developers, we conducted a participatory design study with 25 professional software developers in focus groups. We identify which security information is considered helpful in avoiding insecure cryptographic API use during development. Concerning console messages, participants suggested five core elements, namely message classification, title message, code location, link to detailed external resources, and color. Design guidelines for end-user warnings are only partially suitable in this context. Participants emphasized the importance of tailoring the detail and content of security information to the context. Console warnings call for concise communication; further information needs to be linked externally. Therefore, security feedback should transcend tools and should be adjustable by software developers across development tools, considering the work context and developer needs.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Integrating Facial Cues of Threat into Security Warnings-An fMRI and Field Study
    Eargle, David
    Galletta, Dennis
    Kirwan, C. Brock
    Vance, Anthony
    Jenkins, Jeffrey L.
    [J]. AMCIS 2016 PROCEEDINGS, 2016,
  • [42] An empirical study of developers' discussions about security challenges of different programming languages
    Croft, Roland
    Xie, Yongzheng
    Zahedi, Mansooreh
    Babar, M. Ali
    Treude, Christoph
    [J]. EMPIRICAL SOFTWARE ENGINEERING, 2022, 27 (01)
  • [43] Design and Evaluation of Multi-Media Security Warnings for the Interaction between Humans and Industrial Robots
    Fruth, Jana
    Kraetzer, Christian
    Dittmann, Jana
    [J]. INTELLIGENT ROBOTS AND COMPUTER VISION XXVIII: ALGORITHMS AND TECHNIQUES, 2011, 7878
  • [44] An Extensive Study on Various Cryptographic Alogrithms and its Impact on Cloud Computing Security
    Vikram, A.
    Ganapathy, Gopinath
    [J]. BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (06): : 50 - 55
  • [45] Does physical security of cryptographic devices need a formal study? (Invited talk)
    Standaert, Francois-Xavier
    Malkin, Tal G.
    Yung, Moti
    [J]. INFORMATION THEORETIC SECURITY, PROCEEDINGS, 2008, 5155 : 70 - 70
  • [46] Participatory Design and Participatory Research: An HCI Case Study with Young Forced Migrants
    Duarte, Ana Maria Bustamante
    Brendel, Nina
    Degbelo, Auriol
    Kray, Christian
    [J]. ACM TRANSACTIONS ON COMPUTER-HUMAN INTERACTION, 2018, 25 (01)
  • [47] Efficient PRNG Design and Implementation for Various High Throughput Cryptographic and Low Power Security Applications
    Paul, Bikram
    Trivedi, Gaurav
    Jan, Pidanic
    Nemec, Zdenek
    [J]. 2019 29TH INTERNATIONAL CONFERENCE RADIOELEKTRONIKA (RADIOELEKTRONIKA), 2019, : 99 - 104
  • [48] Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings
    Neupane, Ajaya
    Saxena, Nitesh
    Kuruvilla, Keya
    Georgescu, Michael
    Kana, Rajesh
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [49] A case study in iterative keyboard design using participatory design techniques
    Lindgaard, G
    Caple, D
    [J]. APPLIED ERGONOMICS, 2001, 32 (01) : 71 - 80
  • [50] Large-scale Randomness Study of Security Margins for 100+Cryptographic Functions
    Klinec, Dusan
    Sys, Marek
    Kubicek, Karel
    Svenda, Petr
    Matyas, Vashek
    [J]. SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 134 - 146