Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries

被引:0
|
作者
Blessing, Jenny [1 ]
Specter, Michael A. [2 ]
Weitzner, Daniel J. [3 ]
机构
[1] Univ Cambridge, Cambridge, England
[2] Georgia Inst Technol, Atlanta, GA USA
[3] MIT, Cambridge, MA USA
关键词
Cryptography; Vulnerabilities; Complexity; Cryptography Libraries;
D O I
10.1145/3634737.3657012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of the Internet and numerous other applications rests on a small number of open-source cryptographic libraries: A vulnerability in any one of them threatens to compromise a significant percentage of web traffic. Despite this potential for security impact, the characteristics and causes of vulnerabilities in cryptographic software are not well understood. In this work, we conduct the first systematic, longitudinal analysis of cryptographic libraries and the vulnerabilities they produce. We collect data from the National Vulnerability Database, individual project repositories and mailing lists, and other relevant sources for all widely used cryptographic libraries. In our investigation of the causes of these vulnerabilities, we find evidence of a correlation between the complexity of these libraries and their (in)security, empirically demonstrating the potential risks of bloated cryptographic codebases. Among our most interesting findings is that 48.4% of vulnerabilities in libraries written in C and C++ are either primarily caused or exacerbated by memory safety issues, indicating that systems-level bugs are a major contributor to security issues in these systems. Cryptographic design and implementation issues make up 27.5% of vulnerabilities across all libraries, with side-channel attacks providing a further 19.4%. We find substantial variation among core library components in both complexity levels and vulnerabilities produced: for instance, over one-third of vulnerabilities are located in implementations of the SSL/TLS protocols, providing actionable evidence for codebase quality and security improvements in these libraries.
引用
收藏
页码:605 / 620
页数:16
相关论文
共 50 条
  • [21] An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel
    Jimenez, Matthieu
    Papadakis, Mike
    Le Traon, Yves
    2016 23RD ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2016), 2016, : 105 - 112
  • [22] Empirical analysis of security vulnerabilities in Python packages
    Mahmoud Alfadel
    Diego Elias Costa
    Emad Shihab
    Empirical Software Engineering, 2023, 28
  • [23] RESEARCH ON ARTIFICIAL INTELLIGENCE APPLICATIONS IN CRYPTOGRAPHY WITH AN ANALYSIS IN VULNERABILITIES DETECTION MANAGEMENT
    Jyothi, V. Esther
    Latha, V. Madhu
    Bharathi, D. S. B.
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (03) : 2446 - 2451
  • [24] Competition and patching of security vulnerabilities: An empirical analysis
    Arora, Ashish
    Forman, Chris
    Nandkumar, Anand
    Telang, Rahul
    INFORMATION ECONOMICS AND POLICY, 2010, 22 (02) : 164 - 177
  • [25] Empirical analysis of security vulnerabilities in Python']Python packages
    Alfadel, Mahmoud
    Costa, Diego Elias
    Shihab, Emad
    EMPIRICAL SOFTWARE ENGINEERING, 2023, 28 (03)
  • [26] Empirical Analysis of Security Vulnerabilities in Python']Python Packages
    Alfadel, Mahmoud
    Costa, Diego Elias
    Shihab, Emad
    2021 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2021), 2021, : 446 - 457
  • [27] Patching zero-day vulnerabilities: an empirical analysis
    Roumani, Yaman
    JOURNAL OF CYBERSECURITY, 2021, 7 (01):
  • [28] On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms
    Breier, Jakub
    Jap, Dirmanto
    Hou, Xiaolu
    Bhasin, Shivam
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 1072 - 1085
  • [29] Cryptographic Vulnerabilities in Real-Life Web Servers
    Alashwali, Eman Salem
    2013 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND INFORMATION TECHNOLOGY (ICCIT), 2013, : 6 - 11
  • [30] CRYPTOGRAPHY AND DATA-SECURITY - CRYPTOGRAPHIC PROPERTIES OF ARABIC
    ALKADI, IA
    ARAB GULF JOURNAL OF SCIENTIFIC RESEARCH, 1993, 11 (03): : 457 - 485