Proceedings of the 9th EAI International Conference on Bio-Inspired Information and Communications Technologies (Formerly BIONE 2016
DOI: 10.4108/eai.3-12-2015.2262471
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Cryptography Usage in Android Applications

Abstract: Mobile application developers are using cryptography in their products to protect sensitive data like passwords, short messages, documents etc. In this paper, we study whether cryptography and related techniques are employed in a proper way, in order to protect these private data. To this end, we downloaded 49 Android applications from the Google Play marketplace and performed static and dynamic analysis in an attempt to detect possible cryptographic misuses. The results showed that 87.8% of the applications p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
22
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 34 publications
(24 citation statements)
references
References 10 publications
1
22
0
Order By: Relevance
“…Our manual analysis confirms that all misuses of the Cipher class are due to using the insecure algorithm DES or mode of operation ECB. is result is in line with the findings of prior studies [11,12,27].…”
Section: Types Of Misuses (Rq2)supporting
confidence: 93%
See 1 more Smart Citation
“…Our manual analysis confirms that all misuses of the Cipher class are due to using the insecure algorithm DES or mode of operation ECB. is result is in line with the findings of prior studies [11,12,27].…”
Section: Types Of Misuses (Rq2)supporting
confidence: 93%
“…Unlike C C , CMA has been evaluated on a small dataset of only 45 apps. Chatzikonstantinou et al [11] ran a dynamic checker for a number of misuses and manually verified their findings on 49 apps. All three studies concluded that at least 88% of the studied apps misuse at least one Crypto API.…”
Section: Related Workmentioning
confidence: 99%
“…Even experienced programmers are likely to make mistakes. Such mistakes will compromise the security objective the programmer tries to achieve by using the cryptographic primitives, as studied in the cryptographic misuse literature, e.g., [EBFK13, SGT + 14, CNKX16,MLLD16]. Proper use of low-level cryptographic APIs requires considerable security expertise.…”
Section: Difficult-to-use Low-level Cryptographic Librariesmentioning
confidence: 99%
“…73]. A string of papers, beginning in 2012, have documented widespread cryptographic misuse in mobile applications [FHM + 12, EBFK13, BML + 14, LZLG14, LCWZ14, SGT + 14, CNKX16,MLLD16]. These works define specific types of cryptographic misuse and build tools to detect them.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation