Automatic detection of Java cryptographic API misuses: Are we there yet?

Y Zhang, MMA Kabir, Y **ao, D Yao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The Java platform provides various cryptographic APIs to facilitate secure coding. However,
correctly using these APIs is challenging for developers who lack cybersecurity training …

Crylogger: Detecting crypto misuses dynamically

L Piccolboni, G Di Guglielmo, LP Carloni… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Cryptographic (crypto) algorithms are the essential ingredients of all secure systems: crypto
hash functions and encryption algorithms, for example, can guarantee properties such as …

A novel hybrid method to analyze security vulnerabilities in android applications

J Tang, R Li, K Wang, X Gu, Z Xu - Tsinghua Science and …, 2020 - ieeexplore.ieee.org
We propose a novel hybrid method to analyze the security vulnerabilities in Android
applications. Our method combines static analysis, which consists of metadata and data flow …

SafetyNOT: on the usage of the SafetyNet attestation API in Android

M Ibrahim, A Imran, A Bianchi - Proceedings of the 19th Annual …, 2021 - dl.acm.org
Many apps performing security-sensitive tasks (eg, online banking) attempt to verify the
integrity of the device they are running in and the integrity of their own code. To ease this …

{CryptoREX}: Large-scale analysis of cryptographic misuse in {IoT} devices

L Zhang, J Chen, W Diao, S Guo, J Weng… - … on Research in Attacks …, 2019 - usenix.org
Cryptographic functions play a critical role in the secure transmission and storage of
application data. Although most crypto functions are well-defined and carefully-implemented …

MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search

Z Zhang, H Ma, D Wu, D Gao, X Yi… - 2024 IEEE 9th …, 2024 - ieeexplore.ieee.org
Modern Android apps consist of both host app code and third-party libraries. Traditional
static analysis tools conduct taint analysis for API misuses on the entire app code, while third …

Apicad: Augmenting api misuse detection through specifications from code and documents

X Wang, L Zhao - … IEEE/ACM 45th International Conference on …, 2023 - ieeexplore.ieee.org
Using API should follow its specifications. Otherwise, it can bring security impacts while the
functionality is damaged. To detect API misuse, we need to know what its specifications are …

[PDF][PDF] Towards Precise Reporting of Cryptographic Misuses

Y Chen, Y Liu, KL Wu, DV Le… - … 2024 Network and …, 2024 - ndss-symposium.org
In the last decade, a series of papers were published on using static analysis to detect
cryptographic API misuse. In each paper, apps are checked against a set of rules to see if …

Cardpliance:{PCI}{DSS} compliance of android applications

SY Mahmud, A Acharya, B Andow, W Enck… - 29th USENIX Security …, 2020 - usenix.org
Smartphones and their applications have become a predominant way of computing, and it is
only natural that they have become an important part of financial transaction technology …

Fum-a framework for api usage constraint and misuse classification

M Schlichtig, S Sassalla, K Narasimhan… - … on Software Analysis …, 2022 - ieeexplore.ieee.org
Application Programming Interfaces (APIs) are the primary mechanism that developers use
to obtain access to third-party algorithms and services. Unfortunately, APIs can be misused …