Python Crypto API Misuses in the Wild: Design and Implementation of LICMA

France Nouvelles Nouvelles

Python Crypto API Misuses in the Wild: Design and Implementation of LICMA
France Dernières Nouvelles,France Actualités
  • 📰 hackernoon
  • ⏱ Reading Time:
  • 40 sec. here
  • 2 min. at publisher
  • 📊 Quality Score:
  • News: 19%
  • Publisher: 51%

Explore how AST parsing, Babelfish UAST, and backward slicing algorithms work together to enforce crypto rules and enhance application security.

Authors: Anna-Katharina Wickert, Technische Universität Darmstadt, Darmstadt, Germany ; Lars Baumgärtner, Technische Universität Darmstadt, Darmstadt, Germany ; Florian Breitfelder, Technische Universität Darmstadt, Darmstadt, Germany ; Mira Mezini, Technische Universität Darmstadt, Darmstadt, Germany . Table of Links Abstract and 1 Introduction 2 Background 3 Design and Implementation of Licma and 3.1 Design 3.2 Implementation 4 Methodology and 4.

is given in Figure 1. First, we parse a source code file into the respective Abstract Syntax Tree . More specifically, we use Babelfish to create a Universal Abstract Syntax Tree which combines language-independent AST elements with language-specific elements. For simplicity, we use the term AST in the remainder of the paper. Second, we apply the

In this section, we describe the design of our static analysis tool is given in Figure 1. First, we parse a source code file into the respective Abstract Syntax Tree . More specifically, we use Babelfish to create a Universal Abstract Syntax Tree which combines language-independent AST elements with language-specific elements. For simplicity, we use the term AST in the remainder of the paper. Second, we apply the

Nous avons résumé cette actualité afin que vous puissiez la lire rapidement. Si l'actualité vous intéresse, vous pouvez lire le texte intégral ici. Lire la suite:

hackernoon /  🏆 532. in US

France Dernières Nouvelles, France Actualités

Similar News:Vous pouvez également lire des articles d'actualité similaires à celui-ci que nous avons collectés auprès d'autres sources d'information.

LICMA's Analysis of Crypto API Misuses in Python Apps: Findings and Future DirectionsLICMA's Analysis of Crypto API Misuses in Python Apps: Findings and Future DirectionsExplore insights from LICMA's empirical study on crypto misuses in Python apps, highlighting the impact of user-friendly API design and of hybrid analysis.
Lire la suite »

Python Crypto API Misuses in the Wild: Analyzing Threats to ValidityPython Crypto API Misuses in the Wild: Analyzing Threats to ValidityLearn about the limitations in current analysis tools and frameworks, impacting the accuracy and scope of findings in crypto misuse studies.
Lire la suite »

Evaluating Crypto Misuses in Python: Insights from GitHub Projects and MicroPythonEvaluating Crypto Misuses in Python: Insights from GitHub Projects and MicroPythonLearn about definite misuses, dependency impacts, rule violations, and insights into security vulnerabilities across cryptographic libraries.
Lire la suite »

A Comparative Analysis of Crypto API Misuses Across Programming LanguagesA Comparative Analysis of Crypto API Misuses Across Programming LanguagesExplore a comparative analysis of crypto security across Python, Java, and C based on empirical studies.
Lire la suite »

How We Analyzed Crypto API Misuses in 895 GitHub ProjectsHow We Analyzed Crypto API Misuses in 895 GitHub ProjectsDiscover the methodology behind analyzing crypto misuses in Python and MicroPython projects from GitHub and curated MicroPython repositories.
Lire la suite »

Understanding Crypto API Misuse Patterns: A Comparative Study of Python, Java, and C/C++ ResultsUnderstanding Crypto API Misuse Patterns: A Comparative Study of Python, Java, and C/C++ ResultsGain insights into how API design impacts crypto misuses and discover trends in programming language security vulnerabilities.
Lire la suite »



Render Time: 2025-02-26 01:53:24