Related references
Note: Only part of the references are listed.Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks
Sharmin Afrose et al.
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2022)
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs
Stefan Krueger et al.
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2021)
Coding Practices and Recommendations of Spring Security for Enterprise Applications
Mazharul Islam et al.
2020 IEEE SECURE DEVELOPMENT (SECDEV 2020) (2020)
CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects
Sazzadur Rahaman et al.
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)
Where Did I Leave My Keys. Lessons from the Juniper Dual EC Incident
Stephen Checkoway et al.
COMMUNICATIONS OF THE ACM (2018)
Secure Coding Practices in Java: Challenges and Vulnerabilities
Na Meng et al.
PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE) (2018)
A Stitch in Time: Supporting Android Developers in Writing Secure Code
Duc Cuong Nguyen et al.
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security
Felix Fischer et al.
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)
Build It, Break It, Fix It: Contesting Secure Development
Andrew Ruef et al.
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)