Automatic detection of Java cryptographic API misuses: Are we there yet?

Y Zhang, MMA Kabir, Y **ao, D Yao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The Java platform provides various cryptographic APIs to facilitate secure coding. However,
correctly using these APIs is challenging for developers who lack cybersecurity training …

" False negative-that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing

AS Ami, K Moran, D Poshyvanyk… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
The demand for automated security analysis techniques, such as static analysis based
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …

An investigation into misuse of java security apis by large language models

Z Mousavi, C Islam, K Moore, A Abuadbba… - Proceedings of the 19th …, 2024 - dl.acm.org
The increasing trend of using Large Language Models (LLMs) for code generation raises
the question of their capability to generate trustworthy code. While many researchers are …

Effectiveness of chatgpt for static analysis: How far are we?

MM Mohajer, R Aleithan, NS Harzevili, M Wei… - Proceedings of the 1st …, 2024 - dl.acm.org
This paper conducted a novel study to explore the capabilities of ChatGPT, a state-of-the-art
LLM, in static analysis tasks such as static bug detection and false positive warning removal …

Skipanalyzer: An embodied agent for code analysis with large language models

MM Mohajer, R Aleithan, NS Harzevili, M Wei… - arxiv preprint arxiv …, 2023 - arxiv.org
We introduce SkipAnalyzer, the first large language model (LLM)-powered embodied agent
for static code analysis. It can detect bugs, filter false positive warnings, and patch the …

Llm security guard for code

A Kavian, MM Pourhashem Kallehbasti… - Proceedings of the 28th …, 2024 - dl.acm.org
Many developers rely on Large Language Models (LLMs) to facilitate software development.
Nevertheless, these models have exhibited limited capabilities in the security domain. We …

Example-based vulnerability detection and repair in java code

Y Zhang, Y **ao, MMA Kabir, D Yao… - Proceedings of the 30th …, 2022 - dl.acm.org
The Java libraries JCA and JSSE offer cryptographic APIs to facilitate secure coding. When
developers misuse some of the APIs, their code becomes vulnerable to cyber-attacks. To …

ChatGPT's Potential in Cryptography Misuse Detection: A Comparative Analysis with Static Analysis Tools

E Firouzi, M Ghafari, M Ebrahimi - Proceedings of the 18th ACM/IEEE …, 2024 - dl.acm.org
The correct adoption of cryptography APIs is challenging for mainstream developers, often
resulting in widespread API misuse. Meanwhile, cryptography misuse detectors have …

Runtime verification of crypto apis: an empirical study

A Torres, P Costa, L Amaral, J Pastro… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Misuse of cryptographic (crypto) APIs is a noteworthy cause of security vulnerabilities. For
this reason, static analyzers were recently proposed for detecting crypto API misuses. They …

Specializing neural networks for cryptographic code completion applications

Y **ao, W Song, J Qi, B Viswanath… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Similarities between natural languages and programming languages have prompted
researchers to apply neural network models to software problems, such as code generation …