Loading…

Scrutinizing and Appraising the Usages of Cryptographic API

Developing and maintaining an appropriate series of safety regulations that balance the abuse of cryptographic APIs is a daunting task as cryptographic APIs are continually changing with new primeval and cryptographic settings, rendering current versions balanced. We are proposing a new approach to...

Full description

Saved in:
Bibliographic Details
Published in:International journal of innovative technology and exploring engineering 2020-04, Vol.9 (6), p.2053-2056
Main Authors: Tanmayi, P., Harshini, R. Sri, Mahitha, CH, Padyala, Mr. Venkata Vara Prasad, Kiran, DR. K. V. D
Format: Article
Language:English
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Developing and maintaining an appropriate series of safety regulations that balance the abuse of cryptographic APIs is a daunting task as cryptographic APIs are continually changing with new primeval and cryptographic settings, rendering current versions balanced. We are proposing a new approach to eliminating security patches from thousands of code changes in order to resolve this challenge. Our approach involves (i) detecting program modifications that sometimes cause security fixes, (ii) an abstraction that filters trivial code changes (such as refactoring), and (iii) a cluster analysis that recognizes similarities between semantine program modifications and helps to obtain safety laws. We used our approach to the Java Crypto API and demonstrated that it is effective: (i) effectively filter changes in non-modification code (more than 99% of all changes) without removing them from our abstraction, and (ii) over 80 percent of code changes are security fixes that define security rules. We have established 13 rules, including new ones, based on our findings, that are not supported by existing security checks. CCS COCEPTS: Security and privacy → Systems security; Cryptanalysis and other attacks; Software security engineering;
ISSN:2278-3075
2278-3075
DOI:10.35940/ijitee.D1165.049620