Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks

Sharmin Afrose, Ya Xiao, Sazzadur Rahaman, Barton P. Miller, Danfeng Yao

Research output: Contribution to journalArticlepeer-review

18 Scopus citations

Abstract

Several studies showed that misuses of cryptographic APIs are common in real-world code (e.g., Apache projects and Android apps). There exist several open-sourced and commercial security tools that automatically screen Java programs to detect misuses. To compare their accuracy and security guarantees, we develop two comprehensive benchmarks named CryptoAPI-Bench and ApacheCryptoAPI-Bench. CryptoAPI-Bench consists of 181 unit test cases that cover basic cases, as well as complex cases, including interprocedural, field sensitive, multiple class test cases, and path sensitive data flow of misuse cases. The benchmark also includes correct cases for testing false-positive rates. The ApacheCryptoAPI-Bench consists of 121 cryptographic cases from 10 Apache projects. We evaluate four tools, namely, SpotBugs, CryptoGuard, CrySL, and another tool (anonymous) using both benchmarks. We present their performance and comparative analysis. The ApacheCryptoAPI-Bench also examines the scalability of the tools. Our benchmarks are useful for advancing state-of-the-art solutions in the space of misuse detection.

Original languageEnglish (US)
Pages (from-to)485-497
Number of pages13
JournalIEEE Transactions on Software Engineering
Volume49
Issue number2
DOIs
StatePublished - Feb 1 2023
Externally publishedYes

Keywords

  • Cryptographic API misuses
  • Java
  • benchmark

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks'. Together they form a unique fingerprint.

Cite this