Your firmware has arrived: A study of firmware update vulnerabilities

Y Wu, J Wang, Y Wang, S Zhai, Z Li, Y He… - 33rd USENIX Security …, 2024 - usenix.org
Embedded devices are increasingly ubiquitous in our society. Firmware updates are one of
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …

" False negative-that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing

AS Ami, K Moran, D Poshyvanyk… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
The demand for automated security analysis techniques, such as static analysis based
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …

Evaluation of static vulnerability detection tools with Java cryptographic API benchmarks

S Afrose, Y **ao, S Rahaman… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Several studies showed that misuses of cryptographic APIs are common in real-world code
(eg, Apache projects and Android apps). There exist several open-sourced and commercial …

Practical Security Analysis of {Zero-Knowledge} Proof Circuits

H Wen, J Stephens, Y Chen, K Ferles… - 33rd USENIX Security …, 2024 - usenix.org
As privacy-sensitive applications based on zero-knowledge proofs (ZKPs) gain increasing
traction, there is a pressing need to detect vulnerabilities in ZKP circuits. This paper studies …

Cryptogo: Automatic detection of go cryptographic api misuses

W Li, S Jia, L Liu, F Zheng, Y Ma, J Lin - Proceedings of the 38th Annual …, 2022 - dl.acm.org
Cryptographic algorithms act as essential ingredients of all secure systems. However, the
expected security guarantee from cryptographic algorithms often falls short in practice due to …

Samba: Detecting SSL/TLS API misuses in IoT binary applications

K Liu, M Yang, Z Ling, Y Zhang, C Lei… - IEEE INFOCOM 2024 …, 2024 - ieeexplore.ieee.org
IoT devices are increasingly adopting Secure Socket Layer (SSL) and Transport Layer
Security (TLS) protocols. However, the misuse of SSL/TLS libraries still threatens the …

“I'm pretty expert and I still screw it up”: Qualitative Insights into Experiences and Challenges of Designing and Implementing Cryptographic Library APIs

J Schmüser, P Klostermeyer, K Friedrich… - 2025 IEEE Symposium …, 2024 - computer.org
Cryptographic libraries are a vital security component of software systems, yet their misuse
has caused several incidents. Prior work has established that misuse of cryptographic …

Evaluating C/C++ Vulnerability Detectability of Query-Based Static Application Security Testing Tools

Z Li, Z Liu, WK Wong, P Ma… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In recent years, query-based static application security testing (Q-SAST) tools such as
CodeQL have gained popularity due to their ability to codify vulnerability knowledge into …

ChatGPT's Potential in Cryptography Misuse Detection: A Comparative Analysis with Static Analysis Tools

E Firouzi, M Ghafari, M Ebrahimi - Proceedings of the 18th ACM/IEEE …, 2024 - dl.acm.org
The correct adoption of cryptography APIs is challenging for mainstream developers, often
resulting in widespread API misuse. Meanwhile, cryptography misuse detectors have …

[PDF][PDF] Towards Precise Reporting of Cryptographic Misuses

Y Chen, Y Liu, KL Wu, DV Le… - … 2024 Network and …, 2024 - ndss-symposium.org
In the last decade, a series of papers were published on using static analysis to detect
cryptographic API misuse. In each paper, apps are checked against a set of rules to see if …