Automatic detection of Java cryptographic API misuses: Are we there yet?
The Java platform provides various cryptographic APIs to facilitate secure coding. However,
correctly using these APIs is challenging for developers who lack cybersecurity training …
correctly using these APIs is challenging for developers who lack cybersecurity training …
" False negative-that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing
The demand for automated security analysis techniques, such as static analysis based
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …
An investigation into misuse of java security apis by large language models
The increasing trend of using Large Language Models (LLMs) for code generation raises
the question of their capability to generate trustworthy code. While many researchers are …
the question of their capability to generate trustworthy code. While many researchers are …
Effectiveness of chatgpt for static analysis: How far are we?
This paper conducted a novel study to explore the capabilities of ChatGPT, a state-of-the-art
LLM, in static analysis tasks such as static bug detection and false positive warning removal …
LLM, in static analysis tasks such as static bug detection and false positive warning removal …
Skipanalyzer: An embodied agent for code analysis with large language models
We introduce SkipAnalyzer, the first large language model (LLM)-powered embodied agent
for static code analysis. It can detect bugs, filter false positive warnings, and patch the …
for static code analysis. It can detect bugs, filter false positive warnings, and patch the …
Llm security guard for code
A Kavian, MM Pourhashem Kallehbasti… - Proceedings of the 28th …, 2024 - dl.acm.org
Many developers rely on Large Language Models (LLMs) to facilitate software development.
Nevertheless, these models have exhibited limited capabilities in the security domain. We …
Nevertheless, these models have exhibited limited capabilities in the security domain. We …
Example-based vulnerability detection and repair in java code
The Java libraries JCA and JSSE offer cryptographic APIs to facilitate secure coding. When
developers misuse some of the APIs, their code becomes vulnerable to cyber-attacks. To …
developers misuse some of the APIs, their code becomes vulnerable to cyber-attacks. To …
ChatGPT's Potential in Cryptography Misuse Detection: A Comparative Analysis with Static Analysis Tools
The correct adoption of cryptography APIs is challenging for mainstream developers, often
resulting in widespread API misuse. Meanwhile, cryptography misuse detectors have …
resulting in widespread API misuse. Meanwhile, cryptography misuse detectors have …
Runtime verification of crypto apis: an empirical study
A Torres, P Costa, L Amaral, J Pastro… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Misuse of cryptographic (crypto) APIs is a noteworthy cause of security vulnerabilities. For
this reason, static analyzers were recently proposed for detecting crypto API misuses. They …
this reason, static analyzers were recently proposed for detecting crypto API misuses. They …
Specializing neural networks for cryptographic code completion applications
Similarities between natural languages and programming languages have prompted
researchers to apply neural network models to software problems, such as code generation …
researchers to apply neural network models to software problems, such as code generation …