Evaluation of static vulnerability detection tools with Java cryptographic API benchmarks

S Afrose, Y Xiao, S Rahaman… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Several studies showed that misuses of cryptographic APIs are common in real-world code
(eg, Apache projects and Android apps). There exist several open-sourced and commercial …

Security misconfigurations in open source kubernetes manifests: An empirical study

A Rahman, SI Shamim, DB Bose… - ACM Transactions on …, 2023 - dl.acm.org
Context: Kubernetes has emerged as the de-facto tool for automated container
orchestration. Business and government organizations are increasingly adopting …

Descriptive Analysis of Built-in Security Features in Web Development Frameworks

A Aborujilah, J Adamu, SM Shariff… - 2022 16th International …, 2022 - ieeexplore.ieee.org
Many challenges are facing modern web applications, and security is a major concern for
web applications developers especially when today's web applications are interactive and …

How do developers follow security-relevant best practices when using NPM packages?

MMA Kabir, Y Wang, D Yao… - 2022 IEEE Secure …, 2022 - ieeexplore.ieee.org
Node. js has become popular among developers, partially because of its large software
ecosystem of NPM (Node Package Manager) packages. When building JavaScript (JS) …

Being the developers' friend: Our experience developing a high-precision tool for secure coding

DD Yao, S Rahaman, Y Xiao, S Afrose… - IEEE Security & …, 2022 - ieeexplore.ieee.org
We discuss the needs and challenges of deployable security research by sharing our
experience designing CryptoGuard, a high-precision tool for detecting cryptographic …

SoK: The Design Paradigm of Safe and Secure Defaults

J Ruohonen - arXiv preprint arXiv:2412.17329, 2024 - arxiv.org
In security engineering, including software security engineering, there is a well-known
design paradigm telling to prefer safe and secure defaults. The paper presents a …

[HTML][HTML] Secure and Modular Data Portal: Database System to Manage Broadly Classified and Large Scale Data

AA Lencha, AB Mitiku… - Data Science …, 2024 - datascience.codata.org
Using various types of broadly classified and large-scale datasets, Ethiopian Construction
Design and Supervision Works Corporation (ECDSWC) provides professional services such …

SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions

S Rahaman, M Frantz, B Miller, D Yao - International Conference on …, 2023 - Springer
High-level language platforms provide APIs to aid developers in easily integrating security-
relevant features in their code. Prior research shows that improper use of these APIs is a …

Pengembangan Back End Aplikasi Sistem Informasi Terpadu BSI Pinter menggunakan Spring Framework

MD Zaidan - 2024 - dspace.uii.ac.id
Perkembangan teknologi menuntut seluruh instansi, termasuk sektor perbankan, untuk
secara adaptif mengadopsi teknologi demi meningkatkan inovasi produk mereka sehingga …

Design of telecom operators IDC resale analysis system based on Spark

M Song, Z Jia, Y Huang, L Tang, G Xu… - … , Robotics and System …, 2022 - ieeexplore.ieee.org
A design based on Spark technology is proposed to solve the problem that the telecom
operators' network bandwidth resources are resold. We use big data components such as …