ABCDE
1
TitleAuthorsVenueYearLink
2
Using cognitive dimensions to evaluate the usability of security APIs: An empirical investigation
Wijayarathna, Chamila, and Nalin Asanka Gamagedara Arachchilage
Information and Software Technology
2019
https://www.sciencedirect.com/science/article/abs/pii/S0950584919301624
3
Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic API misuse
Gorski, Peter Leo, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller, Yasemin Acar, and Sascha Fahl.
SOUPS2018
https://www.usenix.org/system/files/conference/soups2018/soups2018-gorski.pdf
4
A methodology to evaluate the usability of security APIs
Wijayarathna, Chamila, and Nalin AG Arachchilage
IEEE International Conference on Information and Automation for Sustainability (ICIAfS)
2018
https://ieeexplore.ieee.org/abstract/document/8913353/
5
A generic cognitive dimensions questionnaire to evaluate the usability of security APIs.
Wijayarathna, Chamila, Nalin AG Arachchilage, and Jill Slay
HCI International2017
https://link.springer.com/chapter/10.1007/978-3-319-58460-7_11
6
I do and I understand. Not yet true for security APIs. So sad
Iacono, Luigi Lo, and Peter Leo Gorski
Euro USEC2017
https://www.ndss-symposium.org/wp-content/uploads/2018/03/eurousec2017_15_LoIacono_paper.pdf
7
Comparing the usability of cryptographic APIs
Acar, Yasemin, Michael Backes, Sascha Fahl, Simson Garfinkel, Doowon Kim, Michelle L. Mazurek, and Christian Stransky.
IEEE S&P2017
https://usp.internet.byu.edu/static/papers/cryptographic-apis-sp-2017.pdf
8
Towards the usability evaluation of security APIs
Gorski, Peter Leo, and Luigi Lo Iacono
HAISA2016
https://books.google.com.au/books?hl=en&lr=&id=zRqqDAAAQBAJ&oi=fnd&pg=PA252&dq=Towards+the+usability+evaluation+of+security+APIs&ots=lt6P79CoPE&sig=3H5g1lgZhjBZj5WaCqDC3jJ06gU#v=onepage&q=Towards%20the%20usability%20evaluation%20of%20security%20APIs&f=false
9
Developers are not the enemy!: The need for usable security APIs
Green, Matthew, and Matthew Smith
IEEE Security & Privacy
2016
http://mattsmith.de/pdfs/DevelopersAreNotTheEnemy.pdf
10
Jumping through hoops: Why do Java developers struggle with cryptography APIs?
Nadi, Sarah, Stefan Krüger, Mira Mezini, and Eric Bodden
ICSE2016
https://www.bodden.de/pubs/nkm+16jumping.pdf