Automatic detection of Java cryptographic API misuses: Are we there yet?

Y Zhang, MMA Kabir, Y Xiao, D Yao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The Java platform provides various cryptographic APIs to facilitate secure coding. However,
correctly using these APIs is challenging for developers who lack cybersecurity training …

D2a: A dataset built for ai-based vulnerability detection methods using differential analysis

Y Zheng, S Pujar, B Lewis, L Buratti… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
Static analysis tools are widely used for vulnerability detection as they understand programs
with complex behavior and millions of lines of code. Despite their popularity, static analysis …

CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs

S Krüger, J Späth, K Ali, E Bodden… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Various studies have empirically shown that the majority of Java and Android applications
misuse cryptographic libraries, causing devastating breaches of data security. It is crucial to …

Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects

S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian… - Proceedings of the …, 2019 - dl.acm.org
Cryptographic API misuses, such as exposed secrets, predictable random numbers, and
vulnerable certificate verification, seriously threaten software security. The vision of …

Learning to represent edits

P Yin, G Neubig, M Allamanis, M Brockschmidt… - arXiv preprint arXiv …, 2018 - arxiv.org
We introduce the problem of learning distributed representations of edits. By combining a"
neural editor" with an" edit encoder", our models learn to represent the salient information of …

Practical Security Analysis of {Zero-Knowledge} Proof Circuits

H Wen, J Stephens, Y Chen, K Ferles… - 33rd USENIX Security …, 2024 - usenix.org
As privacy-sensitive applications based on zero-knowledge proofs (ZKPs) gain increasing
traction, there is a pressing need to detect vulnerabilities in ZKP circuits. This paper studies …

The evolution of type annotations in python: an empirical study

L Di Grazia, M Pradel - Proceedings of the 30th ACM Joint European …, 2022 - dl.acm.org
Type annotations and gradual type checkers attempt to reveal errors and facilitate
maintenance in dynamically typed programming languages. Despite the availability of these …

An investigation into misuse of java security apis by large language models

Z Mousavi, C Islam, K Moore, A Abuadbba… - Proceedings of the 19th …, 2024 - dl.acm.org
The increasing trend of using Large Language Models (LLMs) for code generation raises
the question of their capability to generate trustworthy code. While many researchers are …

Negative results on mining crypto-api usage rules in android apps

J Gao, P Kong, L Li, TF Bissyandé… - 2019 IEEE/ACM 16th …, 2019 - ieeexplore.ieee.org
Android app developers recurrently use crypto-APIs to provide data security to app users.
Unfortunately, misuse of APIs only creates an illusion of security and even exposes apps to …

Exposing library API misuses via mutation analysis

M Wen, Y Liu, R Wu, X Xie… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
Misuses of library APIs are pervasive and often lead to software crashes and vulnerability
issues. Various static analysis tools have been proposed to detect library API misuses. They …