2022
DOI: 10.1109/tdsc.2021.3108031
|View full text |Cite
|
Sign up to set email alerts
|

From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in C/C++

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 37 publications
0
3
0
Order By: Relevance
“…Although static analysis is not expected to be perfect, our results suggest that false alarms in detecting cryptographic misuse can occur not only due to classic challenges, but also because of ① overly conservative misuse rules, ② imprecise modeling, and ③ implementation bugs in detectors themselves. The false alarm patterns due to ① likely also apply to other papers (e.g., [4], [6], [7], [9]) and industrial tools not considered by this work, as they share similar misuse rules.…”
Section: Introductionmentioning
confidence: 75%
See 2 more Smart Citations
“…Although static analysis is not expected to be perfect, our results suggest that false alarms in detecting cryptographic misuse can occur not only due to classic challenges, but also because of ① overly conservative misuse rules, ② imprecise modeling, and ③ implementation bugs in detectors themselves. The false alarm patterns due to ① likely also apply to other papers (e.g., [4], [6], [7], [9]) and industrial tools not considered by this work, as they share similar misuse rules.…”
Section: Introductionmentioning
confidence: 75%
“…A recent work that uses a hybrid approach to find vulnerabilities in binaries [71] also detects any constant seeds used in PRNG regardless of context, and we conjecture that some legitimate usages are also reported as vulnerabilities. Likewise, some overly conservative rules discussed in Section VII are also enforced by a recent work [9].…”
Section: Generalizability Of False Alarm Patternsmentioning
confidence: 99%
See 1 more Smart Citation
“…Their research revealed that 52.26% of Python projects exhibit at least one instance of cryptographic misuse. Rahaman et al [21] developed a static tool named TAINTCRYPT, tailored for detecting cryptographic implementations in C/C++ programming languages. They utilized a specification language of deterministic finite automata (DFA).Rodrigues et al [22] proposed an innovative methodology that combines graph embedding techniques with machine learning models to detect instances of cryptographic abuse in source code.…”
Section: Related Workmentioning
confidence: 99%