How reliable is the crowdsourced knowledge of security implementation?

M Chen, F Fischer, N Meng, X Wang… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
Stack Overflow (SO) is the most popular online Q&A site for developers to share their
expertise in solving programming issues. Given multiple answers to a certain question …

{APISan}: Sanitizing {API} Usages through Semantic {Cross-Checking}

I Yun, C Min, X Si, Y Jang, T Kim, M Naik - 25th USENIX Security …, 2016 - usenix.org
API misuse is a well-known source of bugs. Some of them (eg, incorrect use of SSL API, and
integer overflow of memory allocation size) can cause serious security vulnerabilities (eg …

Symcerts: Practical symbolic execution for exposing noncompliance in X. 509 certificate validation implementations

SY Chau, O Chowdhury, E Hoque, H Ge… - … IEEE symposium on …, 2017 - ieeexplore.ieee.org
The X. 509 Public-Key Infrastructure has long been used in the SSL/TLS protocol to achieve
authentication. A recent trend of Internet-of-Things (IoT) systems employing small footprint …

Example-based vulnerability detection and repair in java code

Y Zhang, Y Xiao, MMA Kabir, D Yao… - Proceedings of the 30th …, 2022 - dl.acm.org
The Java libraries JCA and JSSE offer cryptographic APIs to facilitate secure coding. When
developers misuse some of the APIs, their code becomes vulnerable to cyber-attacks. To …

Evaluating the security of open radio access networks

D Mimran, R Bitton, Y Kfir, E Klevansky, O Brodt… - arXiv preprint arXiv …, 2022 - arxiv.org
The Open Radio Access Network (O-RAN) is a promising RAN architecture, aimed at
reshaping the RAN industry toward an open, adaptive, and intelligent RAN. In this paper, we …

[PDF][PDF] Practical Security Analysis of Zero-Knowledge Proof Circuits.

H Wen, J Stephens, Y Chen, K Ferles, S Pailoor… - IACR Cryptol. ePrint …, 2023 - usenix.org
As privacy-sensitive applications based on zero-knowledge proofs (ZKPs) gain increasing
traction, there is a pressing need to detect vulnerabilities in ZKP circuits. This paper studies …

[PDF][PDF] 软件与网络安全研究综述

刘剑, 苏璞睿, 杨珉, 和亮, 张源, 朱雪阳, 林惠民 - 软件学报, 2017 - jos.org.cn
互联网已经渗入人类社会的各个方面, 极大地推动了社会进步. 与此同时, 各种形式的网络犯罪,
网络窃密等问题频繁发生, 给社会和国家安全带来了极大的危害. 网络安全已经成为公众和政府 …

Devils in the guidance: predicting logic vulnerabilities in payment syndication services through automated documentation analysis

Y Chen, L Xing, Y Qin, X Liao, XF Wang… - 28th USENIX Security …, 2019 - usenix.org
Finding logic flaws today relies on the program analysis that leverages the functionality
information reported in the program's documentation. Our research, however, shows that the …

Arbitrar: User-guided api misuse detection

Z Li, A Machiry, B Chen, M Naik… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Software APIs exhibit rich diversity and complexity which not only renders them a common
source of programming errors but also hinders program analysis tools for checking them …

Oauthlint: An empirical study on oauth bugs in android applications

T Al Rahat, Y Feng, Y Tian - 2019 34th IEEE/ACM International …, 2019 - ieeexplore.ieee.org
Mobile developers use OAuth APIs to implement Single-Sign-On services. However, the
OAuth protocol was originally designed for the authorization for third-party websites not to …