" False negative-that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing

AS Ami, K Moran, D Poshyvanyk… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
The demand for automated security analysis techniques, such as static analysis based
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …

An investigation into misuse of java security apis by large language models

Z Mousavi, C Islam, K Moore, A Abuadbba… - Proceedings of the 19th …, 2024 - dl.acm.org
The increasing trend of using Large Language Models (LLMs) for code generation raises
the question of their capability to generate trustworthy code. While many researchers are …

Llm security guard for code

A Kavian, MM Pourhashem Kallehbasti… - Proceedings of the 28th …, 2024 - dl.acm.org
Many developers rely on Large Language Models (LLMs) to facilitate software development.
Nevertheless, these models have exhibited limited capabilities in the security domain. We …

[HTML][HTML] Time to separate from StackOverflow and match with ChatGPT for encryption

E Firouzi, M Ghafari - Journal of Systems and Software, 2024 - Elsevier
Cryptography is known as a challenging topic for developers. We studied StackOverflow
posts to identify the problems that developers encounter when using Java Cryptography …

Prompting techniques for secure code generation: A systematic investigation

C Tony, NED Ferreyra, M Mutas, S Dhiff… - arxiv preprint arxiv …, 2024 - arxiv.org
Large Language Models (LLMs) are gaining momentum in software development with
prompt-driven programming enabling developers to create code from natural language (NL) …

“Do this! Do that!, And nothing will happen” Do specifications lead to securely stored passwords?

J Hallett, N Patnaik, B Shreeve… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
Does the act of writing a specification (how the code should behave) for a piece of security
sensitive code lead to developers producing more secure code? We asked 138 developers …

Detecting Misuse of Security APIs: A Systematic Review

Z Mousavi, C Islam, MA Babar, A Abuadbba… - arxiv preprint arxiv …, 2023 - arxiv.org
Security Application Programming Interfaces (APIs) are crucial for ensuring software
security. However, their misuse introduces vulnerabilities, potentially leading to severe data …

Java cryptography uses in the wild

M Hazhirpasand, M Ghafari, O Nierstrasz - Proceedings of the 14th ACM …, 2020 - dl.acm.org
[Background] Previous research has shown that developers commonly misuse cryptography
APIs.[Aim] We have conducted an exploratory study to find out how crypto APIs are used in …

ChatGPT's Potential in Cryptography Misuse Detection: A Comparative Analysis with Static Analysis Tools

E Firouzi, M Ghafari, M Ebrahimi - Proceedings of the 18th ACM/IEEE …, 2024 - dl.acm.org
The correct adoption of cryptography APIs is challenging for mainstream developers, often
resulting in widespread API misuse. Meanwhile, cryptography misuse detectors have …

Fluentcrypto: Cryptography in easy mode

S Kafader, M Ghafari - 2021 IEEE International Conference on …, 2021 - ieeexplore.ieee.org
Research has shown that cryptography concepts are hard to understand for developers, and
secure use of cryptography APIs is challenging for mainstream developers. We have …