By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Defining the Edge: Our Unique Focus on Cross-Language Crypto Challenges | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Defining the Edge: Our Unique Focus on Cross-Language Crypto Challenges | HackerNoon
Computing

Defining the Edge: Our Unique Focus on Cross-Language Crypto Challenges | HackerNoon

News Room
Last updated: 2025/07/26 at 7:35 AM
News Room Published 26 July 2025
Share
SHARE

Table of Links

Abstract and I. Introduction

II. Related Work

III. Methodology

IV. Results and Discussion

V. Threats to Validity

VI. Conclusions, Acknowledgments, and References

Sifat et al. investigated three online sources, i.e., Crypto Stack Exchange, Security Stack Exchange, and Quora, to identify complications with respect to implementing security in data transmission [6]. Their findings suggest that the most discussed technique is transport layer security (TLS), and the Cross-Site Scripting (XSS) attack is the main concern of developers. In another study, Yang et al. conducted a large-scale analysis of security-related questions on Stack Overflow [7]. They identified five main categories, i.e., web security, mobile security, cryptography, software security, and system security but they did not look into the challenges of each topic. A recent study conducted by Meng et al. has recognized the challenges of writing secure Java code on Stack Overflow [8]. Their examinations provide compelling evidence that security implications of coding options in Java, e.g., CSRF tokens, are not well-perceived by a large number of developers. Nandi et al. conducted an empirical study on the frequent crypto obstacles with which Java developers commonly face [1]. They triangulated data from a survey, 100 randomly selected Java GitHub repositories, and the top 100 Java cryptography questions asked on Stack Overflow. Their analyses depicted nine main crypto topics, suggesting that developers face difficulties using cryptography. This issue has adversely affected developer performance and software security [9]. A recent study showed that developers blindly use the provided vulnerable code snippets found on Stack Overflow [10]. They mentioned that 15.4% of the 1.3 million Android applications contained security-related code snippets from Stack Overflow. The previous studies solely focused on security or crypto implications of a particular language or in general security-related concerns. In contrast, we specifically analyzed crypto-related questions of any kind irrespective of any programming languages or particular part of cryptography.

Authors:

(1) Mohammadreza Hazhirpasand, Oscar Nierstrasz, University of Bern, Bern, Switzerland;

(2) Mohammadhossein Shabani, Azad University, Rasht, Iran;

(3) Mohammad Ghafari, School of Computer Science, University of Auckland, Auckland, New Zealand.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article People and Machine Software Second Quarters 2025 Income: Mist Expectations
Next Article With Trends Like 'Japanese Walking,' Is Walking Actually Exercise? We Asked Personal Trainers
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

I met Ozzy at his home after he’d quit boozing – he offered me beer at 10am
News
Aptitude Software Groups (APTD) “Buy” rating repeated at Canaccord Genuity Group
News
Stablecoins gain legitimacy as crypto finds clarity in the regulatory fog – News
News
Best 3D Printing Filament and Which to Buy in 2025
News

You Might also Like

Computing

The HackerNoon Newsletter: For Your Next Blog Post: Start Writing via HackerNoon Blogging Templates (7/26/2025) | HackerNoon

2 Min Read
Computing

What Virtual Real Estate Prices Tell Us About Cryptocurrency Bubbles | HackerNoon

8 Min Read
Computing

Linux 6.17 Looks To Address An Old & Obscure Kernel Limitation From 1993

4 Min Read
Computing

Examining the Wealth Effect of Cryptocurrency Prices on Virtual Land Markets | HackerNoon

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?