Recent research suggests that 88% of Android applications that use Java cryptographic APIs make at least one mistake, which results in an insecure implementation. It is unclear, however, if these mistakes originate from code written by application or third-party library developers. Understanding the responsible party for a misuse case is important for vulnerability disclosure. In this paper, we bridge this knowledge gap and introduce source attribution to the analysis of cryptographic API misuse. We developed BinSight, a static program analyzer that supports source attribution, and we analyzed 132K Android applications collected in years 2012, 2015, and 2016. Our results suggest that third-party libraries are the main source of cryptographi...
Description: Artifact Package for the paper Dealing with Variability in API Misuse Specification, ac...
Background: Previous research has shown that crypto APIs are hard for developers to understand and d...
Today's software industry relies heavily on the reuse of existing software libraries. Such libraries...
Recent studies have revealed that 87 % to 96 % of the Android apps using cryptographic APIs have a m...
Various studies have empirically shown that the majority of Java and Android apps misuse cryptograph...
Cryptography has been extensively used in Android applications to guarantee secure communications, c...
To protect sensitive data processed by current applications, developers, whether security experts or...
The Internet of Things (IoT) has become an integral part of modern life, with billions of connected ...
As the cornerstone of the internet, cryptography is becoming increasingly important in software deve...
Cryptography has been extensively used in Android applications to guarantee secure communications, c...
Mobile application developers are using cryptography in their products to protect sensitive data lik...
Security of modern applications is oftentimes flawed due to incorrect usage of cryptographic APIs. R...
APIs are the primary mechanism for developers to gain access to externally defined services and tool...
Android app developers recurrently use crypto-APIs to provide data security to app users. Unfortunat...
This work analyzes cryptography misuse by software developers, from their contributions to online fo...
Description: Artifact Package for the paper Dealing with Variability in API Misuse Specification, ac...
Background: Previous research has shown that crypto APIs are hard for developers to understand and d...
Today's software industry relies heavily on the reuse of existing software libraries. Such libraries...
Recent studies have revealed that 87 % to 96 % of the Android apps using cryptographic APIs have a m...
Various studies have empirically shown that the majority of Java and Android apps misuse cryptograph...
Cryptography has been extensively used in Android applications to guarantee secure communications, c...
To protect sensitive data processed by current applications, developers, whether security experts or...
The Internet of Things (IoT) has become an integral part of modern life, with billions of connected ...
As the cornerstone of the internet, cryptography is becoming increasingly important in software deve...
Cryptography has been extensively used in Android applications to guarantee secure communications, c...
Mobile application developers are using cryptography in their products to protect sensitive data lik...
Security of modern applications is oftentimes flawed due to incorrect usage of cryptographic APIs. R...
APIs are the primary mechanism for developers to gain access to externally defined services and tool...
Android app developers recurrently use crypto-APIs to provide data security to app users. Unfortunat...
This work analyzes cryptography misuse by software developers, from their contributions to online fo...
Description: Artifact Package for the paper Dealing with Variability in API Misuse Specification, ac...
Background: Previous research has shown that crypto APIs are hard for developers to understand and d...
Today's software industry relies heavily on the reuse of existing software libraries. Such libraries...