Data and Documentation
Open Data Policy
FAQ
EN
DE
FR
Suchbegriff
Advanced search
Publication
Back to overview
Java Cryptography Uses in the Wild
Type of publication
Peer-reviewed
Publikationsform
Proceedings (peer-reviewed)
Author
Hazhirpasand Mohammadreza, Ghafari Mohammad, Nierstrasz Oscar,
Project
Agile Software Assistance
Show all
Proceedings (peer-reviewed)
Title of proceedings
Proceedings of the 14th ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)
DOI
10.1145/3382494.3422166
Open Access
URL
http://scg.unibe.ch/archive/papers/Hazh20c.pdf
Type of Open Access
Repository (Green Open Access)
Abstract
[Background] Previous research has shown that developers commonly misuse cryptography APIs. [Aim] We have conducted an exploratory study to find out how crypto APIs are used in open-source Java projects, what types of misuses exist, and why developers make such mistakes. [Method] We used a static analysis tool to analyze hundreds of open-source Java projects that rely on Java Cryptography Architecture, and manually inspected half of the analysis results to assess the tool results. We also contacted the maintainers of these projects by creating an issue on the GitHub repository of each project, and discussed the misuses with developers. [Results] We learned that 85\% of Cryptography APIs are misused, however, not every misuse has severe consequences. Developer feedback showed that security caveats in the documentation of crypto APIs are rare, developers may overlook misuses that originate in third-party code, and the context where a Crypto API is used should be taken into account. [Conclusion] We conclude that using Crypto APIs is still problematic for developers but blindly blaming them for such misuses may lead to erroneous conclusions.
-