Scrutinizing and Appraising the Usages of Cryptographic API

  • et al.
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Developing and maintaining an appropriate series of safety regulations that balance the abuse of cryptographic APIs is a daunting task as cryptographic APIs are continually changing with new primeval and cryptographic settings, rendering current versions balanced. We are proposing a new approach to eliminating security patches from thousands of code changes in order to resolve this challenge. Our approach involves (i) detecting program modifications that sometimes cause security fixes, (ii) an abstraction that filters trivial code changes (such as refactoring), and (iii) a cluster analysis that recognizes similarities between semantine program modifications and helps to obtain safety laws. We used our approach to the Java Crypto API and demonstrated that it is effective: (i) effectively filter changes in non-modification code (more than 99% of all changes) without removing them from our abstraction, and (ii) over 80 percent of code changes are security fixes that define security rules. We have established 13 rules, including new ones, based on our findings, that are not supported by existing security checks. CCS COCEPTS: Security and privacy → Systems security; Cryptanalysis and other attacks; Software security engineering;

Cite

CITATION STYLE

APA

Tanmayi*, P. … Kiran, DR. K. V. D. (2020). Scrutinizing and Appraising the Usages of Cryptographic API. International Journal of Innovative Technology and Exploring Engineering, 9(6), 2053–2056. https://doi.org/10.35940/ijitee.d1165.049620

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free