TY - GEN
T1 - A Comprehensive Benchmark on Java Cryptographic API Misuses
AU - Afrose, Sharmin
AU - Rahaman, Sazzadur
AU - Yao, Danfeng
N1 - Publisher Copyright:
© 2020 ACM.
PY - 2020/3/16
Y1 - 2020/3/16
N2 - Misuses of cryptographic APIs are prevalent in existing real-world Java code. Some open-sourced and commercial cryptographic vulnerability detection tools exist that capture misuses in Java program. To analyze their efficiency and coverage, we build a comprehensive benchmark named CryptoAPI-Bench that consists of 171 unit test cases. The test cases include basic cases and complex cases. We assess four tools i.e., SpotBugs, CryptoGuard, CrySL, and Coverity using CryptoAPI-Bench and show their relative performance.
AB - Misuses of cryptographic APIs are prevalent in existing real-world Java code. Some open-sourced and commercial cryptographic vulnerability detection tools exist that capture misuses in Java program. To analyze their efficiency and coverage, we build a comprehensive benchmark named CryptoAPI-Bench that consists of 171 unit test cases. The test cases include basic cases and complex cases. We assess four tools i.e., SpotBugs, CryptoGuard, CrySL, and Coverity using CryptoAPI-Bench and show their relative performance.
KW - benchmark
KW - cryptographic api misuses
KW - cryptographic vulnerability detection tools
UR - https://www.scopus.com/pages/publications/85083397655
UR - https://www.scopus.com/pages/publications/85083397655#tab=citedBy
U2 - 10.1145/3374664.3379537
DO - 10.1145/3374664.3379537
M3 - Conference contribution
AN - SCOPUS:85083397655
T3 - CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy
SP - 177
EP - 178
BT - CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy
PB - Association for Computing Machinery, Inc
T2 - 10th ACM Conference on Data and Application Security and Privacy, CODASPY 2020
Y2 - 16 March 2020 through 18 March 2020
ER -