Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Automatic detection of Java cryptographic API misuses: Are we there yet?
The Java platform provides various cryptographic APIs to facilitate secure coding. However,
correctly using these APIs is challenging for developers who lack cybersecurity training …
correctly using these APIs is challenging for developers who lack cybersecurity training …
Crylogger: Detecting crypto misuses dynamically
Cryptographic (crypto) algorithms are the essential ingredients of all secure systems: crypto
hash functions and encryption algorithms, for example, can guarantee properties such as …
hash functions and encryption algorithms, for example, can guarantee properties such as …
A novel hybrid method to analyze security vulnerabilities in android applications
J Tang, R Li, K Wang, X Gu, Z Xu - Tsinghua Science and …, 2020 - ieeexplore.ieee.org
We propose a novel hybrid method to analyze the security vulnerabilities in Android
applications. Our method combines static analysis, which consists of metadata and data flow …
applications. Our method combines static analysis, which consists of metadata and data flow …
SafetyNOT: on the usage of the SafetyNet attestation API in Android
Many apps performing security-sensitive tasks (eg, online banking) attempt to verify the
integrity of the device they are running in and the integrity of their own code. To ease this …
integrity of the device they are running in and the integrity of their own code. To ease this …
{CryptoREX}: Large-scale analysis of cryptographic misuse in {IoT} devices
Cryptographic functions play a critical role in the secure transmission and storage of
application data. Although most crypto functions are well-defined and carefully-implemented …
application data. Although most crypto functions are well-defined and carefully-implemented …
MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search
Modern Android apps consist of both host app code and third-party libraries. Traditional
static analysis tools conduct taint analysis for API misuses on the entire app code, while third …
static analysis tools conduct taint analysis for API misuses on the entire app code, while third …
Apicad: Augmenting api misuse detection through specifications from code and documents
X Wang, L Zhao - … IEEE/ACM 45th International Conference on …, 2023 - ieeexplore.ieee.org
Using API should follow its specifications. Otherwise, it can bring security impacts while the
functionality is damaged. To detect API misuse, we need to know what its specifications are …
functionality is damaged. To detect API misuse, we need to know what its specifications are …
[PDF][PDF] Towards Precise Reporting of Cryptographic Misuses
In the last decade, a series of papers were published on using static analysis to detect
cryptographic API misuse. In each paper, apps are checked against a set of rules to see if …
cryptographic API misuse. In each paper, apps are checked against a set of rules to see if …
Cardpliance:{PCI}{DSS} compliance of android applications
Smartphones and their applications have become a predominant way of computing, and it is
only natural that they have become an important part of financial transaction technology …
only natural that they have become an important part of financial transaction technology …
Fum-a framework for api usage constraint and misuse classification
Application Programming Interfaces (APIs) are the primary mechanism that developers use
to obtain access to third-party algorithms and services. Unfortunately, APIs can be misused …
to obtain access to third-party algorithms and services. Unfortunately, APIs can be misused …