Developers Deserve Security Warnings, Too On the Effect of Integrated Security Advice on Cryptographic API Misuse

被引:0
|
作者
Gorski, Peter Leo [1 ]
Lo Iacono, Luigi [1 ]
Wermke, Dominik [2 ]
Stransky, Christian [2 ]
Moeller, Sebastian [3 ]
Acar, Yasemin [2 ]
Fahl, Sascha [4 ]
机构
[1] Cologne Univ Appl Sci, Cologne, Germany
[2] Leibniz Univ Hannover, Hannover, Germany
[3] Tech Univ Berlin, Qual & Usabil Lab, Berlin, Germany
[4] Ruhr Univ Bochum, Bochum, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic API misuse is responsible for a large number of software vulnerabilities. In many cases developers are overburdened by the complex set of programming choices and their security implications. Past studies have identified significant challenges when using cryptographic APIs that lack a certain set of usability features (e.g. easy-to-use documentation or meaningful warning and error messages) leading to an especially high likelihood of writing functionally correct but insecure code. To support software developers in writing more secure code, this work investigates a novel approach aimed at these hard-to-use cryptographic APIs. In a controlled online experiment with 53 participants, we study the effectiveness of API-integrated security advice which informs about an API misuse and places secure programming hints as guidance close to the developer. This allows us to address insecure cryptographic choices including encryption algorithms, key sizes, modes of operation and hashing algorithms with helpful documentation in the guise of warnings. Whenever possible, the security advice proposes code changes to fix the responsible security issues. We find that our approach significantly improves code security. 73% of the participants who received the security advice fixed their insecure code. We evaluate the opportunities and challenges of adopting API-integrated security advice and illustrate the potential to reduce the negative implications of cryptographic API misuse and help developers write more secure code.
引用
收藏
页码:265 / 280
页数:16
相关论文
共 13 条
  • [1] Developers Need Support, Too: A Survey of Security Advice for Software Developers
    Acar, Yasemin
    Stransky, Christian
    Wermke, Dominik
    Weir, Charles
    Mazurek, Michelle L.
    Fahl, Sascha
    [J]. 2017 IEEE CYBERSECURITY DEVELOPMENT (SECDEV), 2017, : 22 - 26
  • [2] Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs
    Gorski, Peter Leo
    Acar, Yasemin
    Lo Iacono, Luigi
    Fahl, Sascha
    [J]. PROCEEDINGS OF THE 2020 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'20), 2020,
  • [3] A Generic Security API for Symmetric Key Management on Cryptographic Devices
    Cortier, Veronique
    Steel, Graham
    [J]. COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 605 - +
  • [4] A generic security API for symmetric key management on cryptographic devices
    Cortier, Veronique
    Steel, Graham
    [J]. INFORMATION AND COMPUTATION, 2014, 238 : 208 - 232
  • [5] SECURITY FEATURES COMPARISON OF MASTER KEY AND IKM CRYPTOGRAPHIC KEY MANAGEMENT FOR RESEARCHERS AND DEVELOPERS
    Yazdanpanah, Saeed
    Chaeikar, Saman Shojae
    Zamani, Mazdak
    Kourdi, Reza
    [J]. PROCEEDINGS OF THE 2011 3RD INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING (ICSTE 2011), 2011, : 365 - 369
  • [6] Data and Service Security of GNSS Sensors Integrated with Cryptographic Module
    Xu, Changhui
    Zhang, Jingkui
    Zhang, Zhiyou
    Hou, Jianning
    Wen, Xujie
    [J]. MICROMACHINES, 2023, 14 (02)
  • [7] Equivalent Circuit Modeling of Cryptographic Integrated Circuit for Information Security Design
    Iokibe, Kengo
    Amano, Tetsuo
    Okamoto, Kaoru
    Toyota, Yoshitaka
    [J]. IEEE TRANSACTIONS ON ELECTROMAGNETIC COMPATIBILITY, 2013, 55 (03) : 581 - 588
  • [8] The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers
    Cavusoglu, H
    Mishra, B
    Raghunathan, S
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE, 2004, 9 (01) : 69 - 104
  • [9] Research and Application of Cryptographic Device Security Monitoring Technology in Space-Ground Integrated Information Network
    Li, Xiaolin
    Zhou, Changchun
    He, Siman
    Yang, Meng
    Shao, Qi
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY, CII 2017, 2017, : 98 - 104
  • [10] Internet of things assisted public security management platform for urban transportation using hybridised cryptographic-integrated steganography
    Bi, Dexu
    Kadry, Seifedine
    Kumar, Priyan Malarvizhi
    [J]. IET INTELLIGENT TRANSPORT SYSTEMS, 2020, 14 (11) : 1497 - 1506