2022
DOI: 10.48550/arxiv.2204.06447
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

CamBench -- Cryptographic API Misuse Detection Tool Benchmark Suite

Abstract: Context: Cryptographic APIs are often misused in real-world applications. To mitigate that, many cryptographic API misuse detection tools have been introduced. However, there exists no established reference benchmark for a fair and comprehensive comparison and evaluation of these tools. While there are benchmarks, they often only address a subset of the domain or were only used to evaluate a subset of existing misuse detection tools. Objective: To fairly compare cryptographic API misuse detection tools and to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Apart from devising detectors, researchers have also prepared two benchmarks, CryptoAPI-Bench [16] and CamBench [17].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Apart from devising detectors, researchers have also prepared two benchmarks, CryptoAPI-Bench [16] and CamBench [17].…”
Section: Related Workmentioning
confidence: 99%
“…Instead, the condition is whether the targeted method (e.g., verify()) is empty, which is checked by verifying that there are no statements of invocation or field loading 17 . In this case, a simple verify() method that always returns false, which rejects any hostnames, would be identified as an insecure implementation of HostnameVerifier.…”
Section: Generalizability Of False Alarm Patternsmentioning
confidence: 99%