Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Your firmware has arrived: A study of firmware update vulnerabilities
Embedded devices are increasingly ubiquitous in our society. Firmware updates are one of
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …
" False negative-that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing
The demand for automated security analysis techniques, such as static analysis based
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …
Evaluation of static vulnerability detection tools with Java cryptographic API benchmarks
Several studies showed that misuses of cryptographic APIs are common in real-world code
(eg, Apache projects and Android apps). There exist several open-sourced and commercial …
(eg, Apache projects and Android apps). There exist several open-sourced and commercial …
Practical Security Analysis of {Zero-Knowledge} Proof Circuits
As privacy-sensitive applications based on zero-knowledge proofs (ZKPs) gain increasing
traction, there is a pressing need to detect vulnerabilities in ZKP circuits. This paper studies …
traction, there is a pressing need to detect vulnerabilities in ZKP circuits. This paper studies …
Cryptogo: Automatic detection of go cryptographic api misuses
Cryptographic algorithms act as essential ingredients of all secure systems. However, the
expected security guarantee from cryptographic algorithms often falls short in practice due to …
expected security guarantee from cryptographic algorithms often falls short in practice due to …
Samba: Detecting SSL/TLS API misuses in IoT binary applications
IoT devices are increasingly adopting Secure Socket Layer (SSL) and Transport Layer
Security (TLS) protocols. However, the misuse of SSL/TLS libraries still threatens the …
Security (TLS) protocols. However, the misuse of SSL/TLS libraries still threatens the …
“I'm pretty expert and I still screw it up”: Qualitative Insights into Experiences and Challenges of Designing and Implementing Cryptographic Library APIs
Cryptographic libraries are a vital security component of software systems, yet their misuse
has caused several incidents. Prior work has established that misuse of cryptographic …
has caused several incidents. Prior work has established that misuse of cryptographic …
Evaluating C/C++ Vulnerability Detectability of Query-Based Static Application Security Testing Tools
In recent years, query-based static application security testing (Q-SAST) tools such as
CodeQL have gained popularity due to their ability to codify vulnerability knowledge into …
CodeQL have gained popularity due to their ability to codify vulnerability knowledge into …
ChatGPT's Potential in Cryptography Misuse Detection: A Comparative Analysis with Static Analysis Tools
The correct adoption of cryptography APIs is challenging for mainstream developers, often
resulting in widespread API misuse. Meanwhile, cryptography misuse detectors have …
resulting in widespread API misuse. Meanwhile, cryptography misuse detectors have …
[PDF][PDF] Towards Precise Reporting of Cryptographic Misuses
In the last decade, a series of papers were published on using static analysis to detect
cryptographic API misuse. In each paper, apps are checked against a set of rules to see if …
cryptographic API misuse. In each paper, apps are checked against a set of rules to see if …