<--- Back to Details
First PageDocument Content
Computing / Cryptography / Cryptographic software / E-commerce / Internet Standards / Internet protocols / Secure communication / Transport Layer Security / Snippet / Microsoft CryptoAPI / Public-key cryptography / Application programming interface
Date: 2017-04-03 16:02:12
Computing
Cryptography
Cryptographic software
E-commerce
Internet Standards
Internet protocols
Secure communication
Transport Layer Security
Snippet
Microsoft CryptoAPI
Public-key cryptography
Application programming interface

Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security Felix Fischer, Konstantin B¨ottinger, Huang Xiao, Christian Stransky∗ , Yasemin Acar∗ , Michael Backes∗ , Sascha Fahl∗

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 1,08 MB

Share Document on Facebook

Similar Documents

TESTING CRYPTOGRAPHIC SECURITY IN YOUR APPLICATIONS Cryptosense provides state-of-the-art analysis software to help some of the world’s largest organizations eliminate the vulnerabilities caused by crypto misuse in the

TESTING CRYPTOGRAPHIC SECURITY IN YOUR APPLICATIONS Cryptosense provides state-of-the-art analysis software to help some of the world’s largest organizations eliminate the vulnerabilities caused by crypto misuse in the

DocID: 1vo5I - View Document

Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL  if ((err = SSLHashSHA1.update(...)) != 0)

Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL if ((err = SSLHashSHA1.update(...)) != 0)

DocID: 1v05R - View Document

Towards Secure Integration of Cryptographic Software Steven Arzt1 Sarah Nadi2 Karim Ali1 Eric Bodden1 Sebastian Erdweg2 Mira Mezini2 1

Towards Secure Integration of Cryptographic Software Steven Arzt1 Sarah Nadi2 Karim Ali1 Eric Bodden1 Sebastian Erdweg2 Mira Mezini2 1

DocID: 1sTNs - View Document

Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. ????, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. ????, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

DocID: 1rEjw - View Document

Why Johnny Still Can’t Encrypt: Evaluating the Usability of Email Encryption Software Steve Sheng Levi Broderick

Why Johnny Still Can’t Encrypt: Evaluating the Usability of Email Encryption Software Steve Sheng Levi Broderick

DocID: 1rrMN - View Document