Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques

The correct use of cryptography is central to ensuring data security in modern software systems. Hence, several academic and commercial static analysis tools have been developed for detecting and mitigating crypto-API misuse. While developers are optimistically adopting these crypto-API misuse detec...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Ami, Amit Seal, Cooper, Nathan, Kafle, Kaushal, Moran, Kevin, Poshyvanyk, Denys, Nadkarni, Adwait
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 631
container_issue
container_start_page 614
container_title
container_volume
creator Ami, Amit Seal
Cooper, Nathan
Kafle, Kaushal
Moran, Kevin
Poshyvanyk, Denys
Nadkarni, Adwait
description The correct use of cryptography is central to ensuring data security in modern software systems. Hence, several academic and commercial static analysis tools have been developed for detecting and mitigating crypto-API misuse. While developers are optimistically adopting these crypto-API misuse detectors (or crypto-detectors) in their software development cycles, this momentum must be accompanied by a rigorous understanding of their effectiveness at finding crypto-API misuse in practice. This paper presents the MASC framework, which enables a systematic and data-driven evaluation of crypto-detectors using mutation testing. We ground MASC in a comprehensive view of the problem space by developing a data-driven taxonomy of existing crypto-API misuse, containing 105 misuse cases organized among nine semantic clusters. We develop 12 generalizable usage-based mutation operators and three mutation scopes that can expressively instantiate thousands of compilable variants of the misuse cases for thoroughly evaluating crypto-detectors. Using MASC, we evaluate nine major crypto-detectors and discover 19 unique, undocumented flaws that severely impact the ability of crypto-detectors to discover misuses in practice. We conclude with a discussion on the diverse perspectives that influence the design of crypto-detectors and future directions towards building security-focused crypto-detectors by design.
doi_str_mv 10.1109/SP46214.2022.9833582
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_RIE</sourceid><recordid>TN_cdi_ieee_primary_9833582</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9833582</ieee_id><sourcerecordid>9833582</sourcerecordid><originalsourceid>FETCH-LOGICAL-i118t-60aacb7933322bdafe5863c4a1841e54ec02624faf5c5b04af9be74e8588ec503</originalsourceid><addsrcrecordid>eNotkM1Kw0AcxFdBsNY-gR72BRL3O7veSmxVqCi04jFstv-YlbSJ2U0hb2_VnmZg5jeHQeiWkpRSYu7Wb0IxKlJGGEuN5lxqdoZmJtNUKSkop8qcownjmUwoI9klugrhixBGuBETVHzUI877sYttsoUILrZ9wEvrm3s8x-sxRNjZ6B1eHGwzHF27x211Ij5729XH7MWHIQB--ON_Gxtw9d5_DxCu0UVlmwCzk07R-3KxyZ-S1evjcz5fJZ5SHRNFrHVlZjjnjJVbW4HUijthqRYUpABHmGKispV0siTCVqaETICWWoOThE_Rzf-uB4Ci6_3O9mNx-oP_AMd1Vfc</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques</title><source>IEEE Electronic Library (IEL)</source><creator>Ami, Amit Seal ; Cooper, Nathan ; Kafle, Kaushal ; Moran, Kevin ; Poshyvanyk, Denys ; Nadkarni, Adwait</creator><creatorcontrib>Ami, Amit Seal ; Cooper, Nathan ; Kafle, Kaushal ; Moran, Kevin ; Poshyvanyk, Denys ; Nadkarni, Adwait</creatorcontrib><description>The correct use of cryptography is central to ensuring data security in modern software systems. Hence, several academic and commercial static analysis tools have been developed for detecting and mitigating crypto-API misuse. While developers are optimistically adopting these crypto-API misuse detectors (or crypto-detectors) in their software development cycles, this momentum must be accompanied by a rigorous understanding of their effectiveness at finding crypto-API misuse in practice. This paper presents the MASC framework, which enables a systematic and data-driven evaluation of crypto-detectors using mutation testing. We ground MASC in a comprehensive view of the problem space by developing a data-driven taxonomy of existing crypto-API misuse, containing 105 misuse cases organized among nine semantic clusters. We develop 12 generalizable usage-based mutation operators and three mutation scopes that can expressively instantiate thousands of compilable variants of the misuse cases for thoroughly evaluating crypto-detectors. Using MASC, we evaluate nine major crypto-detectors and discover 19 unique, undocumented flaws that severely impact the ability of crypto-detectors to discover misuses in practice. We conclude with a discussion on the diverse perspectives that influence the design of crypto-detectors and future directions towards building security-focused crypto-detectors by design.</description><identifier>EISSN: 2375-1207</identifier><identifier>EISBN: 9781665413169</identifier><identifier>EISBN: 1665413166</identifier><identifier>DOI: 10.1109/SP46214.2022.9833582</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Buildings ; Detectors ; Privacy ; Semantics ; Static analysis ; Systematics ; Taxonomy</subject><ispartof>2022 IEEE Symposium on Security and Privacy (SP), 2022, p.614-631</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9833582$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,796,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9833582$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Ami, Amit Seal</creatorcontrib><creatorcontrib>Cooper, Nathan</creatorcontrib><creatorcontrib>Kafle, Kaushal</creatorcontrib><creatorcontrib>Moran, Kevin</creatorcontrib><creatorcontrib>Poshyvanyk, Denys</creatorcontrib><creatorcontrib>Nadkarni, Adwait</creatorcontrib><title>Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques</title><title>2022 IEEE Symposium on Security and Privacy (SP)</title><addtitle>SP</addtitle><description>The correct use of cryptography is central to ensuring data security in modern software systems. Hence, several academic and commercial static analysis tools have been developed for detecting and mitigating crypto-API misuse. While developers are optimistically adopting these crypto-API misuse detectors (or crypto-detectors) in their software development cycles, this momentum must be accompanied by a rigorous understanding of their effectiveness at finding crypto-API misuse in practice. This paper presents the MASC framework, which enables a systematic and data-driven evaluation of crypto-detectors using mutation testing. We ground MASC in a comprehensive view of the problem space by developing a data-driven taxonomy of existing crypto-API misuse, containing 105 misuse cases organized among nine semantic clusters. We develop 12 generalizable usage-based mutation operators and three mutation scopes that can expressively instantiate thousands of compilable variants of the misuse cases for thoroughly evaluating crypto-detectors. Using MASC, we evaluate nine major crypto-detectors and discover 19 unique, undocumented flaws that severely impact the ability of crypto-detectors to discover misuses in practice. We conclude with a discussion on the diverse perspectives that influence the design of crypto-detectors and future directions towards building security-focused crypto-detectors by design.</description><subject>Buildings</subject><subject>Detectors</subject><subject>Privacy</subject><subject>Semantics</subject><subject>Static analysis</subject><subject>Systematics</subject><subject>Taxonomy</subject><issn>2375-1207</issn><isbn>9781665413169</isbn><isbn>1665413166</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2022</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotkM1Kw0AcxFdBsNY-gR72BRL3O7veSmxVqCi04jFstv-YlbSJ2U0hb2_VnmZg5jeHQeiWkpRSYu7Wb0IxKlJGGEuN5lxqdoZmJtNUKSkop8qcownjmUwoI9klugrhixBGuBETVHzUI877sYttsoUILrZ9wEvrm3s8x-sxRNjZ6B1eHGwzHF27x211Ij5729XH7MWHIQB--ON_Gxtw9d5_DxCu0UVlmwCzk07R-3KxyZ-S1evjcz5fJZ5SHRNFrHVlZjjnjJVbW4HUijthqRYUpABHmGKispV0siTCVqaETICWWoOThE_Rzf-uB4Ci6_3O9mNx-oP_AMd1Vfc</recordid><startdate>202205</startdate><enddate>202205</enddate><creator>Ami, Amit Seal</creator><creator>Cooper, Nathan</creator><creator>Kafle, Kaushal</creator><creator>Moran, Kevin</creator><creator>Poshyvanyk, Denys</creator><creator>Nadkarni, Adwait</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>202205</creationdate><title>Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques</title><author>Ami, Amit Seal ; Cooper, Nathan ; Kafle, Kaushal ; Moran, Kevin ; Poshyvanyk, Denys ; Nadkarni, Adwait</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i118t-60aacb7933322bdafe5863c4a1841e54ec02624faf5c5b04af9be74e8588ec503</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Buildings</topic><topic>Detectors</topic><topic>Privacy</topic><topic>Semantics</topic><topic>Static analysis</topic><topic>Systematics</topic><topic>Taxonomy</topic><toplevel>online_resources</toplevel><creatorcontrib>Ami, Amit Seal</creatorcontrib><creatorcontrib>Cooper, Nathan</creatorcontrib><creatorcontrib>Kafle, Kaushal</creatorcontrib><creatorcontrib>Moran, Kevin</creatorcontrib><creatorcontrib>Poshyvanyk, Denys</creatorcontrib><creatorcontrib>Nadkarni, Adwait</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ami, Amit Seal</au><au>Cooper, Nathan</au><au>Kafle, Kaushal</au><au>Moran, Kevin</au><au>Poshyvanyk, Denys</au><au>Nadkarni, Adwait</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques</atitle><btitle>2022 IEEE Symposium on Security and Privacy (SP)</btitle><stitle>SP</stitle><date>2022-05</date><risdate>2022</risdate><spage>614</spage><epage>631</epage><pages>614-631</pages><eissn>2375-1207</eissn><eisbn>9781665413169</eisbn><eisbn>1665413166</eisbn><coden>IEEPAD</coden><abstract>The correct use of cryptography is central to ensuring data security in modern software systems. Hence, several academic and commercial static analysis tools have been developed for detecting and mitigating crypto-API misuse. While developers are optimistically adopting these crypto-API misuse detectors (or crypto-detectors) in their software development cycles, this momentum must be accompanied by a rigorous understanding of their effectiveness at finding crypto-API misuse in practice. This paper presents the MASC framework, which enables a systematic and data-driven evaluation of crypto-detectors using mutation testing. We ground MASC in a comprehensive view of the problem space by developing a data-driven taxonomy of existing crypto-API misuse, containing 105 misuse cases organized among nine semantic clusters. We develop 12 generalizable usage-based mutation operators and three mutation scopes that can expressively instantiate thousands of compilable variants of the misuse cases for thoroughly evaluating crypto-detectors. Using MASC, we evaluate nine major crypto-detectors and discover 19 unique, undocumented flaws that severely impact the ability of crypto-detectors to discover misuses in practice. We conclude with a discussion on the diverse perspectives that influence the design of crypto-detectors and future directions towards building security-focused crypto-detectors by design.</abstract><pub>IEEE</pub><doi>10.1109/SP46214.2022.9833582</doi><tpages>18</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier EISSN: 2375-1207
ispartof 2022 IEEE Symposium on Security and Privacy (SP), 2022, p.614-631
issn 2375-1207
language eng
recordid cdi_ieee_primary_9833582
source IEEE Electronic Library (IEL)
subjects Buildings
Detectors
Privacy
Semantics
Static analysis
Systematics
Taxonomy
title Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T10%3A36%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Why%20Crypto-detectors%20Fail:%20A%20Systematic%20Evaluation%20of%20Cryptographic%20Misuse%20Detection%20Techniques&rft.btitle=2022%20IEEE%20Symposium%20on%20Security%20and%20Privacy%20(SP)&rft.au=Ami,%20Amit%20Seal&rft.date=2022-05&rft.spage=614&rft.epage=631&rft.pages=614-631&rft.eissn=2375-1207&rft.coden=IEEPAD&rft_id=info:doi/10.1109/SP46214.2022.9833582&rft_dat=%3Cieee_RIE%3E9833582%3C/ieee_RIE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781665413169&rft.eisbn_list=1665413166&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9833582&rfr_iscdi=true