This work analyzes cryptography misuse by software developers, from their contributions to online forums on cryptography-based security and cryptographic programming. We studied three popular forums: Oracle Java Cryptography, Google Android Developers, and Google Android Security Discussions. We applied a data mining technique, namely Apriori, to elicit association rules among cryptographic bad practices, platform-specific issues, cryptographic programming tasks, and cryptography-related use cases. We found that, with surprisingly high probabilities (90% for Java and 71% for Android), several types of cryptography misuse can be found in the posts, but unfortunately masked by technology-specific issues and programming concerns. We also found...
Recent studies have shown that developers have difficulties in using cryptographic APIs, which often...
Description: Artifact Package for the paper Dealing with Variability in API Misuse Specification, ac...
Previous studies have shown that cryptography is hard for developers to use and misusing cryptograph...
As the cornerstone of the internet, cryptography is becoming increasingly important in software deve...
Recent studies have revealed that 87 % to 96 % of the Android apps using cryptographic APIs have a m...
We surveyed 97 developers who had used cryptography in open-source projects, in the hope of identify...
Various studies have empirically shown that the majority of Java and Android apps misuse cryptograph...
Recent research suggests that 88% of Android applications that use Java cryptographic APIs make at l...
Cryptography has been extensively used in Android applications to guarantee secure communications, c...
peer reviewedAndroid app developers recurrently use crypto-APIs to provide data security to app user...
Cryptography is often a critical component in secure software systems. Cryptographic primitive misus...
Background: Previous research has shown that crypto APIs are hard for developers to understand and d...
Previous studies have shown that developers regularly seek advice on online forums to resolve their ...
To protect sensitive data processed by current applications, developers, whether security experts or...
Prior research has shown that cryptography is hard to use for developers. We aim to understand what ...
Recent studies have shown that developers have difficulties in using cryptographic APIs, which often...
Description: Artifact Package for the paper Dealing with Variability in API Misuse Specification, ac...
Previous studies have shown that cryptography is hard for developers to use and misusing cryptograph...
As the cornerstone of the internet, cryptography is becoming increasingly important in software deve...
Recent studies have revealed that 87 % to 96 % of the Android apps using cryptographic APIs have a m...
We surveyed 97 developers who had used cryptography in open-source projects, in the hope of identify...
Various studies have empirically shown that the majority of Java and Android apps misuse cryptograph...
Recent research suggests that 88% of Android applications that use Java cryptographic APIs make at l...
Cryptography has been extensively used in Android applications to guarantee secure communications, c...
peer reviewedAndroid app developers recurrently use crypto-APIs to provide data security to app user...
Cryptography is often a critical component in secure software systems. Cryptographic primitive misus...
Background: Previous research has shown that crypto APIs are hard for developers to understand and d...
Previous studies have shown that developers regularly seek advice on online forums to resolve their ...
To protect sensitive data processed by current applications, developers, whether security experts or...
Prior research has shown that cryptography is hard to use for developers. We aim to understand what ...
Recent studies have shown that developers have difficulties in using cryptographic APIs, which often...
Description: Artifact Package for the paper Dealing with Variability in API Misuse Specification, ac...
Previous studies have shown that cryptography is hard for developers to use and misusing cryptograph...