Automatic detection of Java cryptographic API misuses: Are we there yet?

Y Zhang, MMA Kabir, Y Xiao, D Yao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The Java platform provides various cryptographic APIs to facilitate secure coding. However,
correctly using these APIs is challenging for developers who lack cybersecurity training …

Understanding iot security from a market-scale perspective

X Jin, S Manandhar, K Kafle, Z Lin… - Proceedings of the 2022 …, 2022 - dl.acm.org
Consumer IoT products and services are ubiquitous; yet, a proper characterization of
consumer IoT security is infeasible without an understanding of what IoT products are on the …

An empirical evaluation of GDPR compliance violations in Android mHealth apps

M Fan, L Yu, S Chen, H Zhou, X Luo… - 2020 IEEE 31st …, 2020 - ieeexplore.ieee.org
The purpose of the General Data Protection Regulation (GDPR) is to provide improved
privacy protection. If an app controls personal data from users, it needs to be compliant with …

Evaluation of static vulnerability detection tools with Java cryptographic API benchmarks

S Afrose, Y Xiao, S Rahaman… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Several studies showed that misuses of cryptographic APIs are common in real-world code
(eg, Apache projects and Android apps). There exist several open-sourced and commercial …

Crylogger: Detecting crypto misuses dynamically

L Piccolboni, G Di Guglielmo, LP Carloni… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Cryptographic (crypto) algorithms are the essential ingredients of all secure systems: crypto
hash functions and encryption algorithms, for example, can guarantee properties such as …

Why eve and mallory still love android: Revisiting {TLS}({In) Security} in android applications

M Oltrogge, N Huaman, S Amft, Y Acar… - 30th USENIX Security …, 2021 - usenix.org
Android applications have a long history of being vulnerable to man-in-the-middle attacks
due to insecure custom TLS certificate validation implementations. To resolve this, Google …

" False negative--that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing

AS Ami, K Moran, D Poshyvanyk… - arXiv preprint arXiv …, 2023 - arxiv.org
The demand for automated security analysis techniques, such as static analysis based
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …

Security notifications in static analysis tools: Developers' attitudes, comprehension, and ability to act on them

M Tahaei, K Vaniea, K Beznosov… - Proceedings of the 2021 …, 2021 - dl.acm.org
Static analysis tools (SATs) have the potential to assist developers in finding and fixing
vulnerabilities in the early stages of software development, requiring them to be able to …

How well does llm generate security tests?

Y Zhang, W Song, Z Ji, N Meng - arXiv preprint arXiv:2310.00710, 2023 - arxiv.org
Developers often build software on top of third-party libraries (Libs) to improve programmer
productivity and software quality. The libraries may contain vulnerabilities exploitable by …

Why crypto-detectors fail: A systematic evaluation of cryptographic misuse detection techniques

AS Ami, N Cooper, K Kafle, K Moran… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
The correct use of cryptography is central to ensuring data security in modern software
systems. Hence, several academic and commercial static analysis tools have been …