Time to separate from StackOverflow and match with ChatGPT for encryption
This program is tentative and subject to change.
Cryptography is known as a challenging topic for developers. We studied the StackOverflow posts to identify the problems that developers encounter when using the Java Cryptography Architecture (JCA) for symmetric encryption. We investigated the security risks disseminated in these posts, and we examined whether ChatGPT helps avoid cryptography issues. Our manual inspection of 400 StackOverflow posts revealed that developers frequently struggle with key and initialization vector (IV) generation, as well as padding. Exception messages are often confusing and do not uncover the root causes of problems. Security is a top concern among developers, yet security issues are pervasive in the shared code snippets. An analysis of 13 security rules showed that 82% of the inspected posts contained at least one violation, and in a large-scale study of 3,426 posts we identified 5,305 violations, averaging 1.7 violations per post. The most common issues involved the use of insecure encryption modes and hard-coded keys. We further examined how GPT responds to 100 StackOverflow questions. ChatGPT provided “working” solutions, but in most cases it transferred security violations from the question to its answer. When explicitly prompted to provide a “secure solution,” ChatGPT corrected violations in 42 cases, and with more targeted prompting, additional issues could be cleared. Nevertheless, it continued to adopt weak key generation functions and include CBC in scenarios where it is not secure. In summary, we provided a comprehensive study of Java developer challenges in symmetric encryption, revealed the prevalence of security violations in StackOverflow code, highlighted the potential of ChatGPT in complementing human expertise, and demonstrated that while it can assist in evaluating code security, it does not replace human expertise. Developers should remain alert when using ChatGPT as a programming assistant.
This program is tentative and subject to change.
Wed 19 NovDisplayed time zone: Seoul change
11:00 - 12:30 | |||
11:00 10mTalk | When Does Wasm Malware Detection Fail? A Systematic Analysis of Their Robustness to Evasion Research Papers Taeyoung Kim Sungkyunkwan University, Sanghak Oh Sungkyunkwan University, Kiho Lee ETRI (Electronics and Telecommunications Research Institute), South Korea, Weihang Wang University of Southern California, Yonghwi Kwon University of Maryland, Sanghyun Hong Oregon State University, Hyoungshick Kim Sungkyunkwan University | ||
11:10 10mTalk | RFCAudit: AI Agent for Auditing Protocol Implementations Against RFC Specifications Research Papers Mingwei Zheng Purdue University, Chengpeng Wang Purdue University, Xuwei Liu Purdue University, USA, Jinyao Guo Purdue University, Shiwei Feng Purdue University, Xiangyu Zhang Purdue University | ||
11:20 10mTalk | Time to separate from StackOverflow and match with ChatGPT for encryption Journal-First Track | ||
11:30 10mTalk | Demystifying Cross-Language C/C++ Binaries: A Robust Software Component Analysis Approach Research Papers Meiqiu Xu Northeastern University, China, Ying Wang Northeastern University, Wei Tang HUA WEI, Xian Zhan HUA WEI, Shing-Chi Cheung Hong Kong University of Science and Technology, Hai Yu Northeastern University, China, Zhiliang Zhu Northeastern University, China | ||
11:40 10mTalk | Detecting Various DeFi Price Manipulations with LLM Reasoning Research Papers Juantao Zhong Lingnan University, Daoyuan Wu Lingnan University, Ye Liu Singapore Management University, Maoyi Xie Nanyang Technological University, Yang Liu Nanyang Technological University, Yi Li Nanyang Technological University, Ning Liu City University of Hong Kong | ||
11:50 10mTalk | Uncovering Prompt Elements: Cloning System Prompts from Behavioral Traces Research Papers Yi Qian State Key Laboratory for Novel Software Technology, Nanjing University, Pengfei State Key Laboratory for Novel Software Technology, Nanjing University, Hao Wu , Ligeng Chen Honor Device Co., Ltd, Bing Mao Nanjing University | ||
12:00 10mTalk | CRYPTBARA: Dependency-Guided Detection of Python Cryptographic API Misuses Research Papers | ||
12:10 10mTalk | A Large Scale Study of AI-based Binary Function Similarity Detection Techniques for Security Researchers and Practitioners Research Papers Jingyi Shi Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Yufeng Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yang Xiao Chinese Academy of Sciences, Yuekang Li UNSW, Zhengzi Xu Imperial Global Singapore, Sihao Qiu Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China, Chi Zhang Institute of Information Engineering, CAS; School of Cyber Security, UCAS, Keyu Qi Institute of Information Engineering, CAS; School of Cyber Security, UCAS, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xingchu Chen Institute of Information Engineering, CAS; School of Cyber Security, UCAS, Yanyan Zou Institute of Information Engineering, Chinese Academy of Sciences, Yang Liu Nanyang Technological University, Wei Huo Institute of Information Engineering at Chinese Academy of Sciences | ||
12:20 10mTalk | FirmProj: Detecting Firmware Leakage in IoT Update Processes via Companion App Analysis Research Papers Wenzhi Li Shandong University, Jialong Guo Shandong University, Jiongyi Chen National University of Defense Technology, Fan Li Shandong University, Yujie Xing Shandong University, Yanbo Xu Shanghai Jiao Tong University, Shishuai Yang Shandong University, Wenrui Diao Shandong University | ||