Skip to main content

Research Repository

Advanced Search

All Outputs (5)

SLR: From Saltzer and Schroeder to 2021…47 Years of Research on the Development and Validation of Security API Recommendations (2023)
Journal Article
Patnaik, N., Dwyer, A., Hallett, J., & Rashid, A. (2023). SLR: From Saltzer and Schroeder to 2021…47 Years of Research on the Development and Validation of Security API Recommendations. ACM Transactions on Software Engineering and Methodology, 32(3), 1-31. https://doi.org/10.1145/3561383

Producing secure software is challenging. The poor usability of security Application Programming Interfaces (APIs) makes this even harder. Many recommendations have been proposed to support developers by improving the usability of cryptography librar... Read More about SLR: From Saltzer and Schroeder to 2021…47 Years of Research on the Development and Validation of Security API Recommendations.

What Can a Critical Cybersecurity Do? (2022)
Journal Article
Dwyer, A., Stevens, C., Muller, L., Dunn Cavelty, M., Coles-Kemp, L., & Thornton, P. (2022). What Can a Critical Cybersecurity Do?. International Political Sociology, 16(3), Article olac013. https://doi.org/10.1093/ips/olac013

Cybersecurity has attracted significant political, social, and technological attention as contemporary societies have become increasingly reliant on computation. Today, at least within the Global North, there is an ever-pressing and omnipresent threa... Read More about What Can a Critical Cybersecurity Do?.

Beware Suppliers Bearing Gifts!: Analysing coverage of supply chain cyber security in critical national infrastructure sectorial and cross-sectorial frameworks (2021)
Journal Article
Topping, C., Dwyer, A., Michalec, O., Craggs, B., & Rashid, A. (2021). Beware Suppliers Bearing Gifts!: Analysing coverage of supply chain cyber security in critical national infrastructure sectorial and cross-sectorial frameworks. Computers and Security, 108, Article 102324. https://doi.org/10.1016/j.cose.2021.102324

Threat actors are increasingly targeting extended supply chains and abusing client-supplier trust to conduct third-party compromise. Governments are concerned about targeted attacks against critical national infrastructures, where compromise can have... Read More about Beware Suppliers Bearing Gifts!: Analysing coverage of supply chain cyber security in critical national infrastructure sectorial and cross-sectorial frameworks.

Cybersecurity’s Grammars: A More‐than‐Human Geopolitics of Computation (2021)
Journal Article
Dwyer, A. C. (2023). Cybersecurity’s Grammars: A More‐than‐Human Geopolitics of Computation. Area, 55(1), 10-17. https://doi.org/10.1111/area.12728

On one June afternoon in 2017, during an autoethnography of a malware analysis and detection laboratory, NotPetya quickly caused destruction. This malware has since been characterised as a key geopolitical event in cybersecurity, causing billions of... Read More about Cybersecurity’s Grammars: A More‐than‐Human Geopolitics of Computation.