A Comparative Analysis of Crypto API Misuses Across Programming Languages

:::info Authors: (1) Anna-Katharina Wickert, Technische Universität Darmstadt, Darmstadt, Germany (wickert@cs.tu-darmstadt.de); (2) Lars Baumgärtner, Technische Universität Darmstadt, Darmstadt, Germany (baumgaertner@cs.tu-darmstadt.de); (3) Florian Breitfelder, Technische Universität Darmstadt, Darmstadt, Germany (florian.breitfelder@tu-darmstadt.de); (4) Mira Mezini, Technische Universität Darmstadt, Darmstadt, Germany (mezini@cs.tu-darmstadt.de). ::: Table of Links Abstract and 1 Introduction 2 Background 3 Design and Implementation of Licma and … Read more

MicroPython Analysis: Exploring Crypto API Usage and Custom Implementations

:::info Authors: (1) Anna-Katharina Wickert, Technische Universität Darmstadt, Darmstadt, Germany (wickert@cs.tu-darmstadt.de); (2) Lars Baumgärtner, Technische Universität Darmstadt, Darmstadt, Germany (baumgaertner@cs.tu-darmstadt.de); (3) Florian Breitfelder, Technische Universität Darmstadt, Darmstadt, Germany (florian.breitfelder@tu-darmstadt.de); (4) Mira Mezini, Technische Universität Darmstadt, Darmstadt, Germany (mezini@cs.tu-darmstadt.de). ::: Table of Links Abstract and 1 Introduction 2 Background 3 Design and Implementation of Licma and … Read more

Evaluating Crypto Misuses in Python: Insights from GitHub Projects and MicroPython

:::info Authors: (1) Anna-Katharina Wickert, Technische Universität Darmstadt, Darmstadt, Germany (wickert@cs.tu-darmstadt.de); (2) Lars Baumgärtner, Technische Universität Darmstadt, Darmstadt, Germany (baumgaertner@cs.tu-darmstadt.de); (3) Florian Breitfelder, Technische Universität Darmstadt, Darmstadt, Germany (florian.breitfelder@tu-darmstadt.de); (4) Mira Mezini, Technische Universität Darmstadt, Darmstadt, Germany (mezini@cs.tu-darmstadt.de). ::: Table of Links Abstract and 1 Introduction 2 Background 3 Design and Implementation of Licma and … Read more

Understanding Crypto API Misuse Patterns: A Comparative Study of Python, Java, and C/C++ Results

:::info Authors: (1) Anna-Katharina Wickert, Technische Universität Darmstadt, Darmstadt, Germany (wickert@cs.tu-darmstadt.de); (2) Lars Baumgärtner, Technische Universität Darmstadt, Darmstadt, Germany (baumgaertner@cs.tu-darmstadt.de); (3) Florian Breitfelder, Technische Universität Darmstadt, Darmstadt, Germany (florian.breitfelder@tu-darmstadt.de); (4) Mira Mezini, Technische Universität Darmstadt, Darmstadt, Germany (mezini@cs.tu-darmstadt.de). ::: Table of Links Abstract and 1 Introduction 2 Background 3 Design and Implementation of Licma and … Read more

Implementing LICMA: Python and Java Analysis Components for Crypto Misuse Detection

:::info Authors: (1) Anna-Katharina Wickert, Technische Universität Darmstadt, Darmstadt, Germany (wickert@cs.tu-darmstadt.de); (2) Lars Baumgärtner, Technische Universität Darmstadt, Darmstadt, Germany (baumgaertner@cs.tu-darmstadt.de); (3) Florian Breitfelder, Technische Universität Darmstadt, Darmstadt, Germany (florian.breitfelder@tu-darmstadt.de); (4) Mira Mezini, Technische Universität Darmstadt, Darmstadt, Germany (mezini@cs.tu-darmstadt.de). ::: Table of Links Abstract and 1 Introduction 2 Background 3 Design and Implementation of Licma and … Read more

Python Crypto API Misuses in the Wild: Design and Implementation of LICMA

:::info Authors: (1) Anna-Katharina Wickert, Technische Universität Darmstadt, Darmstadt, Germany (wickert@cs.tu-darmstadt.de); (2) Lars Baumgärtner, Technische Universität Darmstadt, Darmstadt, Germany (baumgaertner@cs.tu-darmstadt.de); (3) Florian Breitfelder, Technische Universität Darmstadt, Darmstadt, Germany (florian.breitfelder@tu-darmstadt.de); (4) Mira Mezini, Technische Universität Darmstadt, Darmstadt, Germany (mezini@cs.tu-darmstadt.de). ::: Table of Links Abstract and 1 Introduction 2 Background 3 Design and Implementation of Licma and … Read more

Addressing the Risks of Misusing Crypto Libraries

:::info Authors: (1) Anna-Katharina Wickert, Technische Universität Darmstadt, Darmstadt, Germany (wickert@cs.tu-darmstadt.de); (2) Lars Baumgärtner, Technische Universität Darmstadt, Darmstadt, Germany (baumgaertner@cs.tu-darmstadt.de); (3) Florian Breitfelder, Technische Universität Darmstadt, Darmstadt, Germany (florian.breitfelder@tu-darmstadt.de); (4) Mira Mezini, Technische Universität Darmstadt, Darmstadt, Germany (mezini@cs.tu-darmstadt.de). ::: Table of Links Abstract and 1 Introduction 2 Background 3 Design and Implementation of Licma and … Read more

Common Misuses of Python Crypto APIs in the Wild

:::info Authors: (1) Anna-Katharina Wickert, Technische Universität Darmstadt, Darmstadt, Germany (wickert@cs.tu-darmstadt.de); (2) Lars Baumgärtner, Technische Universität Darmstadt, Darmstadt, Germany (baumgaertner@cs.tu-darmstadt.de); (3) Florian Breitfelder, Technische Universität Darmstadt, Darmstadt, Germany (florian.breitfelder@tu-darmstadt.de); (4) Mira Mezini, Technische Universität Darmstadt, Darmstadt, Germany (mezini@cs.tu-darmstadt.de). ::: Table of Links Abstract and 1 Introduction 2 Background 3 Design and Implementation of Licma and … Read more

How Digital Platforms Undo Paperwork In Real Estate

How Digital Platforms Undo Paperwork In Real Estate Industry Worldwide All the time, the real estate realm has been associated with a huge amount of paperflow. Indeed, property title papers are among the oldest written documents in history. However, this millennia-old tradition is rapidly becoming a thing of the past, as an increasing proportion of … Read more

The Human Roots of Rising Fascism

Fascist movements are gaining traction and influence in the United States and across Europe. To understand this trend, we must look beyond the rhetoric and policies of individual politicians or parties and examine the deeper human needs and seismic societal shifts fueling this political movement. At the most fundamental level, all humans crave comfort and … Read more

Interview with Dr. Yonatan Sompolinsky of Kaspa

I realized the following interview for my book, “Kaspa: From Ghost to Knight, off to heal the blockchain’s plight.“ This book is available for you to buy on Amazon in both paperback and E-book format, and I recommend it for every Kaspa community member or a block-DAG PoW enthusiast to read. To maintain the open-source ethos, this book’s content … Read more

Invisible Online: A Family Guide to Private and Secure Online Living

n Is there a compromise between using social media and other free online services—where if you don’t pay, you’re essentially paying with your data—and avoiding them altogether to preserve anonymity? In today’s hyper-connected world, this question is more relevant than ever. Even if the preference leans towards avoiding these services, I wanted to explore the … Read more

What are Pub/Sub Systems

Let’s say you’re building an application, for example, an e-commerce store. This application will contain necessary components like user authentication, notifications, order processing, inventory management, etc. One challenge you might encounter is how communication between these components can happen. You might want them to interact via direct integration or other messaging patterns, such as point-to-point … Read more

The Five W’s for Setting KPIs

At Hummus Said in Acre, Israel, I always order hummus with Foul, don’t think much about it, just add a bit of salt and digg in with the onion. At Hummus Said, a legendary restaurant in Akko, Israel, I savor their signature dish: creamy hummus with a side of Foul. The taste is always perfect, … Read more

Entrepreneurs, Journalists, Researchers: The Ethereum Influencers to Follow to Stay Informed!

When Ethereum was conceived in 2013, little did we know that it would become the center of attraction and rally competitors in the crypto space. Nevertheless, what about gas fees? Scalability? Network? Competition? Nothing can stop an ETH Maxi from vehemently pushing the narrative of the first-ever smart contract blockchain layer. In every crypto ecosystem, … Read more

Master Debugging Without Breakpoints

In a typical debugging scenario, you would set breakpoints to tell the debugger when to suspend your program. A breakpoint usually corresponds to the moment that marks the starting point of further investigation. It can happen that in some situations you aren’t sure where to set a breakpoint. Other times, you might prefer to suspend … Read more

Boosting Development Efficiency With the Specification-First Principle

In the sphere of software development, innovation and increased productivity play a crucial role. One of the methods to achieve this goal is the application of the Specification-First approach, which structures and manages the development process. This article explores the concept of Specification-First, its significance for development teams, as well as the advantages it brings … Read more

Whose Game Are You Playing?

You and I, as children, were given a drug. Approval, appreciation, praise, success, acceptance, popularity – call it what you will, but it’s a drug that causes dependence on other people at the expense of our authentic desires. “You become a robot. You want to see what kind of a robot existence human beings live? … Read more

Understanding the Privacy Risks of Popular Search Engine Advertising Systems: Related Work

:::info This paper is available on arxiv under CC0 1.0 DEED license. Authors: (1) Salim Chouaki, LIX, CNRS, Inria, Ecole Polytechnique, Institut Polytechnique de Paris; (2) Oana Goga, LIX, CNRS, Inria, Ecole Polytechnique, Institut Polytechnique de Paris; (3) Hamed Haddadi, Imperial College London, Brave Software; (4) Peter Snyder, Brave Software. ::: Table of Links Abstract … Read more

Understanding the Privacy Risks of Popular Search Engine Advertising Systems:Measurement Methodology

:::info This paper is available on arxiv under CC0 1.0 DEED license. Authors: (1) Salim Chouaki, LIX, CNRS, Inria, Ecole Polytechnique, Institut Polytechnique de Paris; (2) Oana Goga, LIX, CNRS, Inria, Ecole Polytechnique, Institut Polytechnique de Paris; (3) Hamed Haddadi, Imperial College London, Brave Software; (4) Peter Snyder, Brave Software. ::: Table of Links Abstract … Read more

Understanding the Privacy Risks of Popular Search Engine Advertising Systems: Background

:::info This paper is available on arxiv under CC0 1.0 DEED license. Authors: (1) Salim Chouaki, LIX, CNRS, Inria, Ecole Polytechnique, Institut Polytechnique de Paris; (2) Oana Goga, LIX, CNRS, Inria, Ecole Polytechnique, Institut Polytechnique de Paris; (3) Hamed Haddadi, Imperial College London, Brave Software; (4) Peter Snyder, Brave Software. ::: Table of Links Abstract … Read more

Understanding the Privacy Risks of Popular Search Engine Advertising Systems: Abstract and Intro

:::info This paper is available on arxiv under CC0 1.0 DEED license. Authors: (1) Salim Chouaki, LIX, CNRS, Inria, Ecole Polytechnique, Institut Polytechnique de Paris; (2) Oana Goga, LIX, CNRS, Inria, Ecole Polytechnique, Institut Polytechnique de Paris; (3) Hamed Haddadi, Imperial College London, Brave Software; (4) Peter Snyder, Brave Software. ::: Table of Links Abstract … Read more

Understanding the Privacy Risks of Popular Search Engine Advertising Systems: Limitations

:::info This paper is available on arxiv under CC0 1.0 DEED license. Authors: (1) Salim Chouaki, LIX, CNRS, Inria, Ecole Polytechnique, Institut Polytechnique de Paris; (2) Oana Goga, LIX, CNRS, Inria, Ecole Polytechnique, Institut Polytechnique de Paris; (3) Hamed Haddadi, Imperial College London, Brave Software; (4) Peter Snyder, Brave Software. ::: Table of Links Abstract … Read more