To protect sensitive data processed by current applications, developers, whether security experts or not, have to rely on cryptography. While cryptography algorithms have become increasingly advanced, many data breaches occur because developers do not correctly use the corresponding APIs. To guide future research into practical solutions to this problem, we perform an empirical investigation into the obstacles developers face while using the Java cryptography APIs, the tasks they use the APIs for, and the kind of (tool) support they desire. We triangulate data from four separate studies that include the analysis of 100 StackOverflow posts, 100 GitHub repositories, and survey input from 48 developers. We find that while developers find it di...
This work analyzes cryptography misuse by software developers, from their contributions to online fo...
When a vulnerability is discovered in a cryptographic algorithm, or in a specific implementation of ...
A pluggable type system is a light-weight approach for compile-time program verification, which prov...
Background: Previous research has shown that crypto APIs are hard for developers to understand and d...
As the cornerstone of the internet, cryptography is becoming increasingly important in software deve...
While cryptography is now readily available to everyone and can, provably, protect private informati...
While cryptography is now readily available to everyone and can, provably, protect private informati...
Recent studies have revealed that 87 % to 96 % of the Android apps using cryptographic APIs have a m...
Various studies have empirically shown that the majority of Java and Android apps misuse cryptograph...
Prior research has shown that cryptography is hard to use for developers. We aim to understand what ...
Developing secure software is essential for protecting passwords and other sensitive data. Despite t...
Recent research suggests that 88% of Android applications that use Java cryptographic APIs make at l...
Cryptographic API misuse is responsible for a large number of software vulnerabilities. In many case...
Recent studies have shown that developers have difficulties in using cryptographic APIs, which often...
We surveyed 97 developers who had used cryptography in open-source projects, in the hope of identify...
This work analyzes cryptography misuse by software developers, from their contributions to online fo...
When a vulnerability is discovered in a cryptographic algorithm, or in a specific implementation of ...
A pluggable type system is a light-weight approach for compile-time program verification, which prov...
Background: Previous research has shown that crypto APIs are hard for developers to understand and d...
As the cornerstone of the internet, cryptography is becoming increasingly important in software deve...
While cryptography is now readily available to everyone and can, provably, protect private informati...
While cryptography is now readily available to everyone and can, provably, protect private informati...
Recent studies have revealed that 87 % to 96 % of the Android apps using cryptographic APIs have a m...
Various studies have empirically shown that the majority of Java and Android apps misuse cryptograph...
Prior research has shown that cryptography is hard to use for developers. We aim to understand what ...
Developing secure software is essential for protecting passwords and other sensitive data. Despite t...
Recent research suggests that 88% of Android applications that use Java cryptographic APIs make at l...
Cryptographic API misuse is responsible for a large number of software vulnerabilities. In many case...
Recent studies have shown that developers have difficulties in using cryptographic APIs, which often...
We surveyed 97 developers who had used cryptography in open-source projects, in the hope of identify...
This work analyzes cryptography misuse by software developers, from their contributions to online fo...
When a vulnerability is discovered in a cryptographic algorithm, or in a specific implementation of ...
A pluggable type system is a light-weight approach for compile-time program verification, which prov...