Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques
The correct use of cryptography is central to ensuring data security in modern software systems. Hence, several academic and commercial static analysis tools have been developed for detecting and mitigating crypto-API misuse. While developers are optimistically adopting these crypto-API misuse detec...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 631 |
---|---|
container_issue | |
container_start_page | 614 |
container_title | |
container_volume | |
creator | Ami, Amit Seal Cooper, Nathan Kafle, Kaushal Moran, Kevin Poshyvanyk, Denys Nadkarni, Adwait |
description | The correct use of cryptography is central to ensuring data security in modern software systems. Hence, several academic and commercial static analysis tools have been developed for detecting and mitigating crypto-API misuse. While developers are optimistically adopting these crypto-API misuse detectors (or crypto-detectors) in their software development cycles, this momentum must be accompanied by a rigorous understanding of their effectiveness at finding crypto-API misuse in practice. This paper presents the MASC framework, which enables a systematic and data-driven evaluation of crypto-detectors using mutation testing. We ground MASC in a comprehensive view of the problem space by developing a data-driven taxonomy of existing crypto-API misuse, containing 105 misuse cases organized among nine semantic clusters. We develop 12 generalizable usage-based mutation operators and three mutation scopes that can expressively instantiate thousands of compilable variants of the misuse cases for thoroughly evaluating crypto-detectors. Using MASC, we evaluate nine major crypto-detectors and discover 19 unique, undocumented flaws that severely impact the ability of crypto-detectors to discover misuses in practice. We conclude with a discussion on the diverse perspectives that influence the design of crypto-detectors and future directions towards building security-focused crypto-detectors by design. |
doi_str_mv | 10.1109/SP46214.2022.9833582 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_RIE</sourceid><recordid>TN_cdi_ieee_primary_9833582</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9833582</ieee_id><sourcerecordid>9833582</sourcerecordid><originalsourceid>FETCH-LOGICAL-i118t-60aacb7933322bdafe5863c4a1841e54ec02624faf5c5b04af9be74e8588ec503</originalsourceid><addsrcrecordid>eNotkM1Kw0AcxFdBsNY-gR72BRL3O7veSmxVqCi04jFstv-YlbSJ2U0hb2_VnmZg5jeHQeiWkpRSYu7Wb0IxKlJGGEuN5lxqdoZmJtNUKSkop8qcownjmUwoI9klugrhixBGuBETVHzUI877sYttsoUILrZ9wEvrm3s8x-sxRNjZ6B1eHGwzHF27x211Ij5729XH7MWHIQB--ON_Gxtw9d5_DxCu0UVlmwCzk07R-3KxyZ-S1evjcz5fJZ5SHRNFrHVlZjjnjJVbW4HUijthqRYUpABHmGKispV0siTCVqaETICWWoOThE_Rzf-uB4Ci6_3O9mNx-oP_AMd1Vfc</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques</title><source>IEEE Electronic Library (IEL)</source><creator>Ami, Amit Seal ; Cooper, Nathan ; Kafle, Kaushal ; Moran, Kevin ; Poshyvanyk, Denys ; Nadkarni, Adwait</creator><creatorcontrib>Ami, Amit Seal ; Cooper, Nathan ; Kafle, Kaushal ; Moran, Kevin ; Poshyvanyk, Denys ; Nadkarni, Adwait</creatorcontrib><description>The correct use of cryptography is central to ensuring data security in modern software systems. Hence, several academic and commercial static analysis tools have been developed for detecting and mitigating crypto-API misuse. While developers are optimistically adopting these crypto-API misuse detectors (or crypto-detectors) in their software development cycles, this momentum must be accompanied by a rigorous understanding of their effectiveness at finding crypto-API misuse in practice. This paper presents the MASC framework, which enables a systematic and data-driven evaluation of crypto-detectors using mutation testing. We ground MASC in a comprehensive view of the problem space by developing a data-driven taxonomy of existing crypto-API misuse, containing 105 misuse cases organized among nine semantic clusters. We develop 12 generalizable usage-based mutation operators and three mutation scopes that can expressively instantiate thousands of compilable variants of the misuse cases for thoroughly evaluating crypto-detectors. Using MASC, we evaluate nine major crypto-detectors and discover 19 unique, undocumented flaws that severely impact the ability of crypto-detectors to discover misuses in practice. We conclude with a discussion on the diverse perspectives that influence the design of crypto-detectors and future directions towards building security-focused crypto-detectors by design.</description><identifier>EISSN: 2375-1207</identifier><identifier>EISBN: 9781665413169</identifier><identifier>EISBN: 1665413166</identifier><identifier>DOI: 10.1109/SP46214.2022.9833582</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Buildings ; Detectors ; Privacy ; Semantics ; Static analysis ; Systematics ; Taxonomy</subject><ispartof>2022 IEEE Symposium on Security and Privacy (SP), 2022, p.614-631</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9833582$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,796,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9833582$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Ami, Amit Seal</creatorcontrib><creatorcontrib>Cooper, Nathan</creatorcontrib><creatorcontrib>Kafle, Kaushal</creatorcontrib><creatorcontrib>Moran, Kevin</creatorcontrib><creatorcontrib>Poshyvanyk, Denys</creatorcontrib><creatorcontrib>Nadkarni, Adwait</creatorcontrib><title>Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques</title><title>2022 IEEE Symposium on Security and Privacy (SP)</title><addtitle>SP</addtitle><description>The correct use of cryptography is central to ensuring data security in modern software systems. Hence, several academic and commercial static analysis tools have been developed for detecting and mitigating crypto-API misuse. While developers are optimistically adopting these crypto-API misuse detectors (or crypto-detectors) in their software development cycles, this momentum must be accompanied by a rigorous understanding of their effectiveness at finding crypto-API misuse in practice. This paper presents the MASC framework, which enables a systematic and data-driven evaluation of crypto-detectors using mutation testing. We ground MASC in a comprehensive view of the problem space by developing a data-driven taxonomy of existing crypto-API misuse, containing 105 misuse cases organized among nine semantic clusters. We develop 12 generalizable usage-based mutation operators and three mutation scopes that can expressively instantiate thousands of compilable variants of the misuse cases for thoroughly evaluating crypto-detectors. Using MASC, we evaluate nine major crypto-detectors and discover 19 unique, undocumented flaws that severely impact the ability of crypto-detectors to discover misuses in practice. We conclude with a discussion on the diverse perspectives that influence the design of crypto-detectors and future directions towards building security-focused crypto-detectors by design.</description><subject>Buildings</subject><subject>Detectors</subject><subject>Privacy</subject><subject>Semantics</subject><subject>Static analysis</subject><subject>Systematics</subject><subject>Taxonomy</subject><issn>2375-1207</issn><isbn>9781665413169</isbn><isbn>1665413166</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2022</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotkM1Kw0AcxFdBsNY-gR72BRL3O7veSmxVqCi04jFstv-YlbSJ2U0hb2_VnmZg5jeHQeiWkpRSYu7Wb0IxKlJGGEuN5lxqdoZmJtNUKSkop8qcownjmUwoI9klugrhixBGuBETVHzUI877sYttsoUILrZ9wEvrm3s8x-sxRNjZ6B1eHGwzHF27x211Ij5729XH7MWHIQB--ON_Gxtw9d5_DxCu0UVlmwCzk07R-3KxyZ-S1evjcz5fJZ5SHRNFrHVlZjjnjJVbW4HUijthqRYUpABHmGKispV0siTCVqaETICWWoOThE_Rzf-uB4Ci6_3O9mNx-oP_AMd1Vfc</recordid><startdate>202205</startdate><enddate>202205</enddate><creator>Ami, Amit Seal</creator><creator>Cooper, Nathan</creator><creator>Kafle, Kaushal</creator><creator>Moran, Kevin</creator><creator>Poshyvanyk, Denys</creator><creator>Nadkarni, Adwait</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>202205</creationdate><title>Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques</title><author>Ami, Amit Seal ; Cooper, Nathan ; Kafle, Kaushal ; Moran, Kevin ; Poshyvanyk, Denys ; Nadkarni, Adwait</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i118t-60aacb7933322bdafe5863c4a1841e54ec02624faf5c5b04af9be74e8588ec503</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Buildings</topic><topic>Detectors</topic><topic>Privacy</topic><topic>Semantics</topic><topic>Static analysis</topic><topic>Systematics</topic><topic>Taxonomy</topic><toplevel>online_resources</toplevel><creatorcontrib>Ami, Amit Seal</creatorcontrib><creatorcontrib>Cooper, Nathan</creatorcontrib><creatorcontrib>Kafle, Kaushal</creatorcontrib><creatorcontrib>Moran, Kevin</creatorcontrib><creatorcontrib>Poshyvanyk, Denys</creatorcontrib><creatorcontrib>Nadkarni, Adwait</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ami, Amit Seal</au><au>Cooper, Nathan</au><au>Kafle, Kaushal</au><au>Moran, Kevin</au><au>Poshyvanyk, Denys</au><au>Nadkarni, Adwait</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques</atitle><btitle>2022 IEEE Symposium on Security and Privacy (SP)</btitle><stitle>SP</stitle><date>2022-05</date><risdate>2022</risdate><spage>614</spage><epage>631</epage><pages>614-631</pages><eissn>2375-1207</eissn><eisbn>9781665413169</eisbn><eisbn>1665413166</eisbn><coden>IEEPAD</coden><abstract>The correct use of cryptography is central to ensuring data security in modern software systems. Hence, several academic and commercial static analysis tools have been developed for detecting and mitigating crypto-API misuse. While developers are optimistically adopting these crypto-API misuse detectors (or crypto-detectors) in their software development cycles, this momentum must be accompanied by a rigorous understanding of their effectiveness at finding crypto-API misuse in practice. This paper presents the MASC framework, which enables a systematic and data-driven evaluation of crypto-detectors using mutation testing. We ground MASC in a comprehensive view of the problem space by developing a data-driven taxonomy of existing crypto-API misuse, containing 105 misuse cases organized among nine semantic clusters. We develop 12 generalizable usage-based mutation operators and three mutation scopes that can expressively instantiate thousands of compilable variants of the misuse cases for thoroughly evaluating crypto-detectors. Using MASC, we evaluate nine major crypto-detectors and discover 19 unique, undocumented flaws that severely impact the ability of crypto-detectors to discover misuses in practice. We conclude with a discussion on the diverse perspectives that influence the design of crypto-detectors and future directions towards building security-focused crypto-detectors by design.</abstract><pub>IEEE</pub><doi>10.1109/SP46214.2022.9833582</doi><tpages>18</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 2375-1207 |
ispartof | 2022 IEEE Symposium on Security and Privacy (SP), 2022, p.614-631 |
issn | 2375-1207 |
language | eng |
recordid | cdi_ieee_primary_9833582 |
source | IEEE Electronic Library (IEL) |
subjects | Buildings Detectors Privacy Semantics Static analysis Systematics Taxonomy |
title | Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T10%3A36%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Why%20Crypto-detectors%20Fail:%20A%20Systematic%20Evaluation%20of%20Cryptographic%20Misuse%20Detection%20Techniques&rft.btitle=2022%20IEEE%20Symposium%20on%20Security%20and%20Privacy%20(SP)&rft.au=Ami,%20Amit%20Seal&rft.date=2022-05&rft.spage=614&rft.epage=631&rft.pages=614-631&rft.eissn=2375-1207&rft.coden=IEEPAD&rft_id=info:doi/10.1109/SP46214.2022.9833582&rft_dat=%3Cieee_RIE%3E9833582%3C/ieee_RIE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781665413169&rft.eisbn_list=1665413166&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9833582&rfr_iscdi=true |