Studying Secure Coding in the Laboratory: Why, What, Where, How, and Who?

Research output: Chapter in Book/Report/Conference proceedingsConference proceedingpeer-review

Abstract

Software security is an area of growing concern, with over 192,000 known vulnerabilities in public software at the time of writing. Many aids to secure coding exist. Assessing the effectiveness of such aids in a laboratory environment is difficult. There are a number of concerns to address, such as recruitment issues and the level of instrumentation needed to perform an accurate measurement. Based on an extensive literature review of software development aids, we describe recent approaches to running laboratory studies, their characteristics, and their benefits and drawbacks. This paper should be of use to anyone planning to undertake coding studies with software developers.

Original languageEnglish
Title of host publicationProceedings - 2023 IEEE/ACM 4th International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages23-30
Number of pages8
ISBN (Electronic)9798350338140
DOIs
Publication statusPublished - 2023
Event4th IEEE/ACM International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS 2023 - Melbourne, Australia
Duration: 15 May 2023 → …

Publication series

NameProceedings - 2023 IEEE/ACM 4th International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS 2023

Conference

Conference4th IEEE/ACM International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS 2023
Country/TerritoryAustralia
CityMelbourne
Period15/05/23 → …

Keywords

  • application security
  • secure application development
  • secure development
  • secure development lifecycle
  • secure development processes
  • secure development tools
  • secure programming
  • security issue
  • software developer
  • software programmer
  • Software security

Fingerprint

Dive into the research topics of 'Studying Secure Coding in the Laboratory: Why, What, Where, How, and Who?'. Together they form a unique fingerprint.

Cite this