Safe cryptography for all: towards visual metaphor driven cryptography building blocks

Dirk van der Linden, Awais Rashid, Emma J Williams, Bogdan Warinschi

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2 Citations (Scopus)
162 Downloads (Pure)

Abstract

In this vision paper, we focus on a key aspect of the modern software developer’s potential to write secure software: their (lack of) success in securely using cryptography APIs. In particular, we note that most ongoing research tends to focus on identifying concrete problems software developers experience, and providing workable solutions, but that such solutions still require developers to identify the appropriate API calls to make and, worse, to be familiar with and configure sometimes obscure parameters of such calls. In contrast, we envision identifying and employing targeted visual metaphors to allow developers to simply select the most appropriate cryptographic functionality they need.
Original languageEnglish
Title of host publication2018 IEEE/ACM 1st International Workshop on Security Awareness from Design to Deployment (SEAD 2018)
Subtitle of host publicationProceedings of a meeting held 27 May - 3 June 2018, Gothenburg, Sweden.
PublisherAssociation for Computing Machinery (ACM)
Pages41-44
Number of pages4
ISBN (Electronic)9781450357272
ISBN (Print)9781538661789
DOIs
Publication statusPublished - 1 Oct 2018
EventFirst International Workshop on Security Awareness from Design to Deployment: The 40th International Conference on Software Engineering - Gothenburg, Sweden
Duration: 27 May 20183 Jun 2018
http://design.se.rit.edu/SEAD2018/

Conference

ConferenceFirst International Workshop on Security Awareness from Design to Deployment
Abbreviated titleSEAD'18
Country/TerritorySweden
Period27/05/183/06/18
Internet address

Research Groups and Themes

  • Cyber Security

Fingerprint

Dive into the research topics of 'Safe cryptography for all: towards visual metaphor driven cryptography building blocks'. Together they form a unique fingerprint.

Cite this