CamBench-Cryptographic API Misuse Detection Tool Benchmark Suite

被引:0
|
作者
Schlichtig, Michael [1 ]
Wickert, Anna-Katharina [2 ]
Krüger, Stefan [3 ]
Bodden, Eric [4 ]
Mezini, Mira [2 ]
机构
[1] Heinz Nixdorf Institute, Paderborn University, Paderborn, Germany
[2] Technische Universität Darmstadt, Darmstadt, Germany
[3] Independent, Germany
[4] Heinz Nixdorf Institute, Paderborn University, Fraunhofer IEM, Paderborn, Germany
来源
arXiv | 2022年
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
API misuse - Benchmark - Benchmark suites - Comprehensive comparisons - CryptoGraphics - Detection tools - Generation process - Misuse detection - Real-world - Reference benchmarks
引用
收藏
相关论文
共 49 条
  • [11] CryptoGo: Automatic Detection of Go Cryptographic API Misuses
    Li, Wenqing
    Jia, Shijie
    Liu, Limin
    Zheng, Fangyu
    Ma, Yuan
    Lin, Jingqiang
    [J]. ACM International Conference Proceeding Series, 2022, : 318 - 331
  • [12] Industrial Strength Static Detection for Cryptographic API Misuses
    Xiao, Ya
    Zhao, Yang
    Allen, Nicholas
    Keynes, Nathan
    Yao, Danfeng
    Cifuentes, Cristina
    [J]. 2022 IEEE SECURE DEVELOPMENT CONFERENCE (SECDEV 2022), 2022, : 61 - 62
  • [13] API Misuse Bug Detection Based on Deep Learning
    Wang, Xin
    Chen, Chi
    Zhao, Yi-Fan
    Peng, Xin
    Zhao, Wen-Yun
    [J]. Ruan Jian Xue Bao/Journal of Software, 2019, 30 (05): : 1342 - 1358
  • [14] Cooperative API Misuse Detection Using Correction Rules
    Nielebock, Sebastian
    Heumueller, Robert
    Krueger, Jacob
    Ortmeier, Frank
    [J]. 2020 IEEE/ACM 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: NEW IDEAS AND EMERGING RESULTS (ICSE-NIER 2020), 2020, : 73 - 76
  • [15] Developers Deserve Security Warnings, Too On the Effect of Integrated Security Advice on Cryptographic API Misuse
    Gorski, Peter Leo
    Lo Iacono, Luigi
    Wermke, Dominik
    Stransky, Christian
    Moeller, Sebastian
    Acar, Yasemin
    Fahl, Sascha
    [J]. PROCEEDINGS OF THE FOURTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY, 2018, : 265 - 280
  • [16] Modelling Analysis and Auto Detection of Cryptographic Misuse in Android Applications
    Shao Shuai
    Dong Guowei
    Guo Tao
    Yang Tianchang
    Shi Chenjie
    [J]. 2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 75 - +
  • [17] Towards a clone detection benchmark suite and results archive
    Lakhotia, A
    Li, JW
    Walenstein, A
    Yang, Y
    [J]. IWPC 2003: 11TH IEEE INTERNATIONAL WORKSHOP ON PROGRAM COMPREHENSION, 2003, : 285 - 286
  • [18] Boosting API Misuse Detection via Integrating API Constraints from Multiple Sources
    Li, Can
    Zhang, Jingxuan
    Tang, Yixuan
    Li, Zhuhang
    Sun, Tianyue
    [J]. 2024 IEEE/ACM 21ST INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES, MSR, 2024, : 14 - 26
  • [19] Active Learning of Discriminative Subgraph Patterns for API Misuse Detection
    Kang, Hong Jin
    Lo, David
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (08) : 2761 - 2783
  • [20] API Misuse Detection in C Programs: Practice on SSL APIs
    Li, Chi
    Gu, Zuxing
    Zhou, Min
    Wu, Jiecheng
    Zhang, Jiarui
    Gu, Ming
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2019, 29 (11-12) : 1761 - 1779