From Legacy Designs to Vulnerability Fixes: Understanding SAST Adoption in Non-Technological Companies
Static analysis tools are essential for identifying software quality issues, bugs, and security vulnerabilities in source or binary code. Despite their importance, limited research has examined how non-technological companies approach software security and integrate Static Application Security Testing (SAST) tools into their development pipelines. To advance understanding in this area, we investigated the motivations, challenges, and benefits associated with adopting SAST tools. Our study involved the use of CogniCrypt and CryptoGuard—two state-of-the-art tools for detecting cryptographic API misuses, a common source of software vulnerabilities. We organized focus groups with software developers and security experts from three organizations and performed a thematic analysis following a grounded theory approach to identify factors influencing SAST adoption and participants’ perceptions of these tools’ effectiveness. The analysis revealed themes reflecting concerns about false positives, overconfidence in state-of-the-practice security tools, reliance on infrastructure-based data protection, and persistent challenges in remediating vulnerabilities in legacy systems. Despite these difficulties, participants recognized the value of SAST tools in enhancing security awareness, facilitating knowledge transfer, and promoting secure software development practices. Based on these insights, we provide actionable recommendations to support SAST adoption and improve the usability, reporting clarity, and integration of tools such as CogniCrypt and CryptoGuard. As a concrete outcome, one participating company decided to remediate all cryptographic API misuses identified during our collaboration.
Wed 18 MarDisplayed time zone: Athens change
14:00 - 15:30 | Session 2B - Security, Vulnerabilities, and MisusesResearch Track / Industrial Track at Megaron Beta Chair(s): Minhaz F. Zibran Idaho State University | ||
14:00 15mTalk | What You Trust Is Insecure: Demystifying How Developers (Mis)Use Trusted Execution Environments in Practice Research Track Yuqing Niu , Jieke Shi Singapore Management University, Ruidong Han Singapore Management University, Ye Liu Singapore Management University, Chengyan Ma Singapore Management University, Yunbo Lyu Singapore Management University, David Lo Singapore Management University Pre-print | ||
14:15 15mTalk | From Patterns to Precision: LLM-Guided Detection of Signature Verification Flaws in Smart Contracts Research Track | ||
14:30 15mTalk | SeBERTis: A Framework for Producing Classifiers of Security-Related Issue Reports Research Track Sogol Masoumzadeh Mcgill University, Yufei Li McGill University, Shane McIntosh University of Waterloo, Daniel Varro Linköping University / McGill University, Lili Wei McGill University | ||
14:45 15mTalk | MLmisFinder: A Specification and Detection Approach of Machine Learning Service Misuses Research Track Hadil Ben Amor Ecole de Technologie Supérieure, Niruthiha Selvanayagam Ecole de Technologie Supérieure, Manel Abdellatif École de Technologie Supérieure, Taher A. Ghaleb Trent University, Naouel Moha École de Technologie Supérieure (ETS) | ||
15:00 15mTalk | VulTerminator: Bringing Back Template-Based Automated Repair for Fixing Java Vulnerabilities Research Track Quang-Cuong Bui Hamburg University of Technology, Emanuele Iannone Hamburg University of Technology, Riccardo Scandariato Hamburg University of Technology Pre-print | ||
15:15 15mTalk | From Legacy Designs to Vulnerability Fixes: Understanding SAST Adoption in Non-Technological Companies Industrial Track Luis Henrique Vieira Amaral University of Brasília, Brazil, Michael Schlichtig Heinz Nixdorf Institut, Paderborn University, Wagner Emanuel , Joilton Almeida de Jesus , Carine Ferreira , Jérôme Kempf , Rodrigo Bonifácio Informatics Center - CIn/UFPE and Computer Science Department / University of Brasília, Eric Bodden Heinz Nixdorf Institute at Paderborn University & Fraunhofer IEM, Laerte Peotta University of Brasília, Brazil, Gustavo Pinto Zup Innovation & UFPA, Márcio Ribeiro Federal University of Alagoas, Brazil | ||