The Case for Adaptive Security Interventions

Rauf, Irum and Petre, Marian and Tun, Thein T. and Lopez, Tamara and Lunn, Paul and van der Linden, Dirk and Towse, John and Sharp, Helen and Levine, Mark and Rashid, Awais and Nuseibeh, Bashar (2022) The Case for Adaptive Security Interventions. ACM Transactions on Software Engineering and Methodology, 31 (1): 9. pp. 1-52. ISSN 1049-331X

[thumbnail of The Case for Adaptive Security Interventions-Cameraready]
Text (The Case for Adaptive Security Interventions-Cameraready)
The_Case_for_Adaptive_Security_Interventions_Cameraready.pdf - Accepted Version
Available under License Creative Commons Attribution.

Download (741kB)


Despite the availability of various methods and tools to facilitate secure coding, developers continue to write code that contains common vulnerabilities. It is important to understand why technological advances do not sufficiently facilitate developers in writing secure code. In order to widen our understanding of developers’ behaviour, we considered the complexity of the security decision space of developers using theory from cognitive and social psychology. Our interdisciplinary study reported in this paper (1) draws on the psychology literature to provide conceptual underpinnings for three categories of impediments to achieving security goals, (2) reports on an in-depth meta-analysis of existing software security literature which identified a catalogue of factors that influence developers’ security decisions, and (3) characterises the landscape of existing security interventions that are available to the developer during coding and identifies gaps. Collectively, these show that different forms of impediments to achieving security goals arise from different contributing factors. Interventions will be more effective where they reflect psychological factors more sensitively and marry technical sophistication, psychological frameworks, and usability. Our analysis suggests ‘adaptive security interventions’ as a solution that responds to the changing security needs of individual developers and a present a proof-of-concept tool to substantiate our suggestion.

Item Type:
Journal Article
Journal or Publication Title:
ACM Transactions on Software Engineering and Methodology
Uncontrolled Keywords:
?? software ??
ID Code:
Deposited By:
Deposited On:
13 Jul 2021 16:00
Last Modified:
12 Feb 2024 00:41