Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic API misuse

Research output: Chapter in book/report/conference proceedingConference contributionResearchpeer review

Authors

  • Peter Leo Gorski
  • Luigi Lo Iacono
  • Dominik Wermke
  • Christian Stransky
  • Sebastian Moeller
  • Yasemin Acar
  • Sascha Fahl

Research Organisations

External Research Organisations

  • TH Köln - University of Applied Sciences
  • Technische Universität Berlin
  • Ruhr-Universität Bochum
View graph of relations

Details

Original languageEnglish
Title of host publicationProceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018
Pages265-280
Number of pages16
ISBN (electronic)9781939133106
Publication statusPublished - 2019
Event14th Symposium on Usable Privacy and Security, SOUPS 2018 - Baltimore, United States
Duration: 12 Aug 201814 Aug 2018

Publication series

NameProceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018

Abstract

Cryptographic API misuse is responsible for a large number of software vulnerabilities. In many cases developers are overburdened by the complex set of programming choices and their security implications. Past studies have identified significant challenges when using cryptographic APIs that lack a certain set of usability features (e. g. easy-to-use documentation or meaningful warning and error messages) leading to an especially high likelihood of writing functionally correct but insecure code. To support software developers in writing more secure code, this work investigates a novel approach aimed at these hard-to-use cryptographic APIs. In a controlled online experiment with 53 participants, we study the effectiveness of API-integrated security advice which informs about an API misuse and places secure programming hints as guidance close to the developer. This allows us to address insecure cryptographic choices including encryption algorithms, key sizes, modes of operation and hashing algorithms with helpful documentation in the guise of warnings. Whenever possible, the security advice proposes code changes to fix the responsible security issues. We find that our approach significantly improves code security. 73% of the participants who received the security advice fixed their insecure code. We evaluate the opportunities and challenges of adopting API-integrated security advice and illustrate the potential to reduce the negative implications of cryptographic API misuse and help developers write more secure code.

ASJC Scopus subject areas

Cite this

Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic API misuse. / Gorski, Peter Leo; Iacono, Luigi Lo; Wermke, Dominik et al.
Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018. 2019. p. 265-280 (Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018).

Research output: Chapter in book/report/conference proceedingConference contributionResearchpeer review

Gorski, PL, Iacono, LL, Wermke, D, Stransky, C, Moeller, S, Acar, Y & Fahl, S 2019, Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic API misuse. in Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018. Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018, pp. 265-280, 14th Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, United States, 12 Aug 2018.
Gorski, P. L., Iacono, L. L., Wermke, D., Stransky, C., Moeller, S., Acar, Y., & Fahl, S. (2019). Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic API misuse. In Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018 (pp. 265-280). (Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018).
Gorski PL, Iacono LL, Wermke D, Stransky C, Moeller S, Acar Y et al. Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic API misuse. In Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018. 2019. p. 265-280. (Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018).
Gorski, Peter Leo ; Iacono, Luigi Lo ; Wermke, Dominik et al. / Developers deserve security warnings, too : On the effect of integrated security advice on cryptographic API misuse. Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018. 2019. pp. 265-280 (Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018).
Download
@inproceedings{6cf8744f1596463ab3b72056686da6c3,
title = "Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic API misuse",
abstract = "Cryptographic API misuse is responsible for a large number of software vulnerabilities. In many cases developers are overburdened by the complex set of programming choices and their security implications. Past studies have identified significant challenges when using cryptographic APIs that lack a certain set of usability features (e. g. easy-to-use documentation or meaningful warning and error messages) leading to an especially high likelihood of writing functionally correct but insecure code. To support software developers in writing more secure code, this work investigates a novel approach aimed at these hard-to-use cryptographic APIs. In a controlled online experiment with 53 participants, we study the effectiveness of API-integrated security advice which informs about an API misuse and places secure programming hints as guidance close to the developer. This allows us to address insecure cryptographic choices including encryption algorithms, key sizes, modes of operation and hashing algorithms with helpful documentation in the guise of warnings. Whenever possible, the security advice proposes code changes to fix the responsible security issues. We find that our approach significantly improves code security. 73% of the participants who received the security advice fixed their insecure code. We evaluate the opportunities and challenges of adopting API-integrated security advice and illustrate the potential to reduce the negative implications of cryptographic API misuse and help developers write more secure code.",
author = "Gorski, {Peter Leo} and Iacono, {Luigi Lo} and Dominik Wermke and Christian Stransky and Sebastian Moeller and Yasemin Acar and Sascha Fahl",
note = "Funding Information: The authors would like to thank Joe Calandrino and the anonymous reviewers for providing feedback; and all participants of this study for their voluntary participation. This work has been partially funded by the German Federal Ministry of Education and Research within the funding program ”Forschung an Fachhochschulen”(contract no. 13FH016IX6). ; 14th Symposium on Usable Privacy and Security, SOUPS 2018 ; Conference date: 12-08-2018 Through 14-08-2018",
year = "2019",
language = "English",
series = "Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018",
pages = "265--280",
booktitle = "Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018",

}

Download

TY - GEN

T1 - Developers deserve security warnings, too

T2 - 14th Symposium on Usable Privacy and Security, SOUPS 2018

AU - Gorski, Peter Leo

AU - Iacono, Luigi Lo

AU - Wermke, Dominik

AU - Stransky, Christian

AU - Moeller, Sebastian

AU - Acar, Yasemin

AU - Fahl, Sascha

N1 - Funding Information: The authors would like to thank Joe Calandrino and the anonymous reviewers for providing feedback; and all participants of this study for their voluntary participation. This work has been partially funded by the German Federal Ministry of Education and Research within the funding program ”Forschung an Fachhochschulen”(contract no. 13FH016IX6).

PY - 2019

Y1 - 2019

N2 - Cryptographic API misuse is responsible for a large number of software vulnerabilities. In many cases developers are overburdened by the complex set of programming choices and their security implications. Past studies have identified significant challenges when using cryptographic APIs that lack a certain set of usability features (e. g. easy-to-use documentation or meaningful warning and error messages) leading to an especially high likelihood of writing functionally correct but insecure code. To support software developers in writing more secure code, this work investigates a novel approach aimed at these hard-to-use cryptographic APIs. In a controlled online experiment with 53 participants, we study the effectiveness of API-integrated security advice which informs about an API misuse and places secure programming hints as guidance close to the developer. This allows us to address insecure cryptographic choices including encryption algorithms, key sizes, modes of operation and hashing algorithms with helpful documentation in the guise of warnings. Whenever possible, the security advice proposes code changes to fix the responsible security issues. We find that our approach significantly improves code security. 73% of the participants who received the security advice fixed their insecure code. We evaluate the opportunities and challenges of adopting API-integrated security advice and illustrate the potential to reduce the negative implications of cryptographic API misuse and help developers write more secure code.

AB - Cryptographic API misuse is responsible for a large number of software vulnerabilities. In many cases developers are overburdened by the complex set of programming choices and their security implications. Past studies have identified significant challenges when using cryptographic APIs that lack a certain set of usability features (e. g. easy-to-use documentation or meaningful warning and error messages) leading to an especially high likelihood of writing functionally correct but insecure code. To support software developers in writing more secure code, this work investigates a novel approach aimed at these hard-to-use cryptographic APIs. In a controlled online experiment with 53 participants, we study the effectiveness of API-integrated security advice which informs about an API misuse and places secure programming hints as guidance close to the developer. This allows us to address insecure cryptographic choices including encryption algorithms, key sizes, modes of operation and hashing algorithms with helpful documentation in the guise of warnings. Whenever possible, the security advice proposes code changes to fix the responsible security issues. We find that our approach significantly improves code security. 73% of the participants who received the security advice fixed their insecure code. We evaluate the opportunities and challenges of adopting API-integrated security advice and illustrate the potential to reduce the negative implications of cryptographic API misuse and help developers write more secure code.

UR - http://www.scopus.com/inward/record.url?scp=85075912193&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:85075912193

T3 - Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018

SP - 265

EP - 280

BT - Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018

Y2 - 12 August 2018 through 14 August 2018

ER -