| dc.creator | Braga | |
| dc.creator | Alexandre; Dahab | |
| dc.creator | Ricardo | |
| dc.date | 2016 | |
| dc.date | 2017-11-13T13:50:42Z | |
| dc.date | 2017-11-13T13:50:42Z | |
| dc.date.accessioned | 2018-03-29T06:07:12Z | |
| dc.date.available | 2018-03-29T06:07:12Z | |
| dc.identifier | 978-1-5090-3713-1 | |
| dc.identifier | 2016 Ieee International Conference On Software Quality, Reliability And Security Companion (qrs-c 2016). Ieee Computer Soc, p. 143 - 150, 2016. | |
| dc.identifier | WOS:000386627300019 | |
| dc.identifier | 10.1109/QRS-C.2016.23 | |
| dc.identifier | http://ieeexplore.ieee.org/document/7573736/ | |
| dc.identifier | http://repositorio.unicamp.br/jspui/handle/REPOSIP/329244 | |
| dc.identifier.uri | http://repositorioslatinoamericanos.uchile.cl/handle/2250/1366269 | |
| dc.description | This work analyzes cryptography misuse by software developers, from their contributions to online forums on cryptography-based security and cryptographic programming. We studied three popular forums: Oracle Java Cryptography, Google Android Developers, and Google Android Security Discussions. We applied a data mining technique, namely Apriori, to elicit association rules among cryptographic bad practices, platform-specific issues, cryptographic programming tasks, and cryptography-related use cases. We found that, with surprisingly high probabilities (90% for Java and 71% for Android), several types of cryptography misuse can be found in the posts, but unfortunately masked by technology-specific issues and programming concerns. We also found that cryptographic bad practices frequently occur in pairs or triples. We related triple associations to use cases and tasks, characterizing worst case scenarios of cryptography misuse. Finally, we observed that hard-to-use architectures confuse developers and contribute to perpetuate recurring errors in cryptographic programming. | |
| dc.description | 143 | |
| dc.description | 150 | |
| dc.description | IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) | |
| dc.description | AUG 01-03, 2016 | |
| dc.description | Vienna, AUSTRIA | |
| dc.description | | |
| dc.language | English | |
| dc.publisher | IEEE Computer Soc | |
| dc.publisher | Los Alamitos | |
| dc.relation | 2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C 2016) | |
| dc.rights | fechado | |
| dc.source | WOS | |
| dc.subject | Cryptography Misuse | |
| dc.subject | Apriori Algorithm | |
| dc.subject | Data Mining | |
| dc.subject | Java Cryptographic Architecture | |
| dc.subject | Secure Coding | |
| dc.title | Mining Cryptography Misuse In Online Forums | |
| dc.type | Actas de congresos | |