A Dataset of Parametric Cryptographic Misuses
暂无分享,去创建一个
Michael Eichberg | Mira Mezini | Anna-Katharina Wickert | Michael Reif | Anam Dodhy | M. Mezini | Michael Eichberg | Michael Reif | Anna-Katharina Wickert | Anam Dodhy
[1] Mira Mezini,et al. A Systematic Evaluation of Static API-Misuse Detectors , 2017, IEEE Transactions on Software Engineering.
[2] Koushik Sen,et al. DeepBugs: a learning approach to name-based bug detection , 2018, Proc. ACM Program. Lang..
[3] Na Meng,et al. Secure Coding Practices in Java: Challenges and Vulnerabilities , 2017, 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE).
[4] Mira Mezini,et al. "Jumping Through Hoops": Why do Java Developers Struggle with Cryptography APIs? , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).
[5] Dimitris Mitropoulos,et al. VulinOSS: A Dataset of Security Vulnerabilities in Open-Source Systems , 2018, 2018 IEEE/ACM 15th International Conference on Mining Software Repositories (MSR).
[6] Cryptographic Mechanisms: Recommendations and Key Lengths, Version 2022-01 , 2019 .
[7] Robert H. Deng,et al. CDRep: Automatic Repair of Cryptographic Misuses in Android Applications , 2016, AsiaCCS.
[8] David Brumley,et al. An empirical study of cryptographic misuse in android applications , 2013, CCS.
[9] Mira Mezini,et al. CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs , 2019 .
[10] Xi Wang,et al. Why does cryptographic software fail?: a case study and open problems , 2014, APSys.
[11] Simson L. Garfinkel,et al. Comparing the Usability of Cryptographic APIs , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[12] Mira Mezini,et al. MUBench: A Benchmark for API-Misuse Detectors , 2016, 2016 IEEE/ACM 13th Working Conference on Mining Software Repositories (MSR).
[13] Robert W. Bowdidge,et al. Why don't software developers use static analysis tools to find bugs? , 2013, 2013 35th International Conference on Software Engineering (ICSE).