Kuo-Chuan Yeh
Pennsylvania State University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Kuo-Chuan Yeh.
annual computer security applications conference | 2014
Daniela A. S. de Oliveira; Marissa Rosenthal; Nicole Morin; Kuo-Chuan Yeh; Justin Cappos; Yanyan Zhuang
Despite the security communitys emphasis on the importance of building secure software, the number of new vulnerabilities found in our systems is increasing. In addition, vulnerabilities that have been studied for years are still commonly reported in vulnerability databases. This paper investigates a new hypothesis that software vulnerabilities are blind spots in developers heuristic-based decision-making processes. Heuristics are simple computational models to solve problems without considering all the information available. They are an adaptive response to our short working memory because they require less cognitive effort. Our hypothesis is that as software vulnerabilities represent corner cases that exercise unusual information flows, they tend to be left out from the repertoire of heuristics used by developers during their programming tasks. To validate this hypothesis we conducted a study with 47 developers using psychological manipulation. In this study each developer worked for approximately one hour on six vulnerable programming scenarios. The sessions progressed from providing no information about the possibility of vulnerabilities, to priming developers about unexpected results, and explicitly mentioning the existence of vulnerabilities in the code. The results show that (i) security is not a priority in software development environments, (ii) security is not part of developers mindset while coding, (iii) developers assume common cases for their code, (iv) security thinking requires cognitive effort, (v) security education helps, but developers can have difficulties correlating a particular learned vulnerability or security information with their current working task, and (vi) priming or explicitly cueing about vulnerabilities on-the-spot is a powerful mechanism to make developers aware about potential vulnerabilities.
Ergonomics in Design | 2010
Kuo-Chuan Yeh; Jonah P. Gregory; Frank E. Ritter
FEATURE AT A GLANCE: We examine the user experience of the XO laptop (the “
frontiers in education conference | 2011
Kuo-Chuan Yeh; Ying Xie; Fengfeng Ke
100 laptop”). The XO laptop combines many technology innovations and is used in the United States and abroad. We asked users to perform a range of simple tasks to demonstrate that several aspects of the XO laptop and similar devices can be improved, including hardware and software. Our recommendations are not difficult modifications. What we found suggests that usability problems may pose a greater risk to the success of this device than perhaps was imagined by its designers. We hope to see the XO laptops usability become more polished and that usability, in general, will be considered appropriately as a potential risk for similar products.
Society for Information Technology & Teacher Education International Conference | 2009
Kuo-Chuan Yeh
new security paradigms workshop | 2014
Justin Cappos; Yanyan Zhuang; Daniela A. S. de Oliveira; Marissa Rosenthal; Kuo-Chuan Yeh
Educational Technology archive | 2013
Noela Haughton; Kuo-Chuan Yeh; John Nworie; Liz Romero
Archive | 2012
Kuo-Chuan Yeh; Frank E. Ritter
frontiers in education conference | 2011
Kuo-Chuan Yeh; Wei-Fan Chen
international conference on foundations of augmented cognition | 2011
Frank E. Ritter; Kuo-Chuan Yeh
Archive | 2013
Kuo-Chuan Yeh; Frank E. Ritter; Kevin Voller