Skip to main content

Showing 1–7 of 7 results for author: Wickert, A

.
  1. arXiv:2403.07808  [pdf

    cs.SE

    Supporting Error Chains in Static Analysis for Precise Evaluation Results and Enhanced Usability

    Authors: Anna-Katharina Wickert, Michael Schlichtig, Marvin Vogel, Lukas Winter, Mira Mezini, Eric Bodden

    Abstract: Context: Static analyses are well-established to aid in understanding bugs or vulnerabilities during the development process or in large-scale studies. A low false-positive rate is essential for the adaption in practice and for precise results of empirical studies. Unfortunately, static analyses tend to report where a vulnerability manifests rather than the fix location. This can cause presumed fa… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    Comments: 12 pages, 4 figures, accepted by the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), March 12-15, 2024, Rovaniemi, Finland at the research papers track

  2. UNGOML: Automated Classification of unsafe Usages in Go

    Authors: Anna-Katharina Wickert, Clemens Damke, Lars Baumgärtner, Eyke Hüllermeier, Mira Mezini

    Abstract: The Go programming language offers strong protection from memory corruption. As an escape hatch of these protections, it provides the unsafe package. Previous studies identified that this unsafe package is frequently used in real-world code for several purposes, e.g., serialization or casting types. Due to the variety of these reasons, it may be possible to refactor specific usages to avoid potent… ▽ More

    Submitted 1 June, 2023; originally announced June 2023.

    Comments: 13 pages, accepted at the 2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR 2023)

  3. arXiv:2209.11103  [pdf, other

    cs.CR cs.SE

    To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild

    Authors: Anna-Katharina Wickert, Lars Baumgärtner, Michael Schlichtig, Krishna Narasimhan, Mira Mezini

    Abstract: Recent studies have revealed that 87 % to 96 % of the Android apps using cryptographic APIs have a misuse which may cause security vulnerabilities. As previous studies did not conduct a qualitative examination of the validity and severity of the findings, our objective was to understand the findings in more depth. We analyzed a set of 936 open-source Java applications for cryptographic misuses. Ou… ▽ More

    Submitted 24 March, 2023; v1 submitted 22 September, 2022; originally announced September 2022.

    Comments: 8 pages, published in 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), December 09-11, 2022, Wuhan, China

  4. arXiv:2204.06447  [pdf, ps, other

    cs.SE

    CamBench -- Cryptographic API Misuse Detection Tool Benchmark Suite

    Authors: Michael Schlichtig, Anna-Katharina Wickert, Stefan Krüger, Eric Bodden, Mira Mezini

    Abstract: Context: Cryptographic APIs are often misused in real-world applications. Therefore, many cryptographic API misuse detection tools have been introduced. However, there exists no established reference benchmark for a fair and comprehensive comparison and evaluation of these tools. While there are benchmarks, they often only address a subset of the domain or were only used to evaluate a subset of ex… ▽ More

    Submitted 13 April, 2022; originally announced April 2022.

    Comments: 8 pages, accepted at the MSR 2022 Registered Reports Track as a In-Principal Acceptance (IPA)

  5. Python Crypto Misuses in the Wild

    Authors: Anna-Katharina Wickert, Lars Baumgärtner, Florian Breitfelder, Mira Mezini

    Abstract: Background: Previous studies have shown that up to 99.59 % of the Java apps using crypto APIs misuse the API at least once. However, these studies have been conducted on Java and C, while empirical studies for other languages are missing. For example, a controlled user study with crypto tasks in Python has shown that 68.5 % of the professional developers write a secure solution for a crypto task.… ▽ More

    Submitted 2 September, 2021; originally announced September 2021.

    Comments: 6 pages, to be published in the proceedings of the 15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) (ESEM 21), October 11-15, 2021, Bari Italy

    ACM Class: D.2.2

    Journal ref: ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM 2021)

  6. arXiv:2011.06244  [pdf, other

    cs.SE

    A Fine-grained Data Set and Analysis of Tangling in Bug Fixing Commits

    Authors: Steffen Herbold, Alexander Trautsch, Benjamin Ledel, Alireza Aghamohammadi, Taher Ahmed Ghaleb, Kuljit Kaur Chahal, Tim Bossenmaier, Bhaveet Nagaria, Philip Makedonski, Matin Nili Ahmadabadi, Kristof Szabados, Helge Spieker, Matej Madeja, Nathaniel Hoy, Valentina Lenarduzzi, Shangwen Wang, Gema Rodríguez-Pérez, Ricardo Colomo-Palacios, Roberto Verdecchia, Paramvir Singh, Yihao Qin, Debasish Chakroborti, Willard Davis, Vijay Walunj, Hongjun Wu , et al. (23 additional authors not shown)

    Abstract: Context: Tangled commits are changes to software that address multiple concerns at once. For researchers interested in bugs, tangled commits mean that they actually study not only bugs, but also other concerns irrelevant for the study of bugs. Objective: We want to improve our understanding of the prevalence of tangling and the types of changes that are tangled within bug fixing commits. Metho… ▽ More

    Submitted 13 October, 2021; v1 submitted 12 November, 2020; originally announced November 2020.

    Comments: Status: Accepted at Empirical Software Engineering

  7. arXiv:2010.11242  [pdf, other

    cs.CR cs.SE

    Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild

    Authors: Johannes Lauinger, Lars Baumgärtner, Anna-Katharina Wickert, Mira Mezini

    Abstract: The Go programming language aims to provide memory and thread safety through measures such as automated memory management with garbage collection and a strict type system. However, it also offers a way of circumventing this safety net through the use of the unsafe package. While there are legitimate use cases for unsafe, developers must exercise caution to avoid introducing vulnerabilities like bu… ▽ More

    Submitted 21 October, 2020; originally announced October 2020.

    Comments: This is a copy of the accepted version at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020)