首页> 外文会议>IEEE Cybersecurity Development Conference >Tutorial: Principles and Practices of Secure Crypto Coding in Java
【24h】

Tutorial: Principles and Practices of Secure Crypto Coding in Java

机译:教程:Java中安全加密编码的原则和实践

获取原文

摘要

Various software libraries and frameworks provide a variety of APIs to support secure coding. However, misusing these APIs can cost developers tremendous time and effort, introduce security vulnerabilities to software, and cause serious consequences like data leakage or Denial of Service (DoS) on servers. No prior tutorial educates people on the best practice of secure coding, the pitfalls that should be avoided, and the remediation of insecure code. To increase the security awareness of developers and improve the quality of their software products, we propose a 90-minute tutorial to teach participants the principles and practices of Java secure coding. In this tutorial, we will introduce the principles of using security APIs, analyze typical API misuse cases to explain the causes and effects. We will also introduce a tool that we recently developed to automatically detect API misuse in Java. There are five parts in our tutorial. To reveal the existing status of secure coding practice, we will first introduce the findings in our recent study on StackOverflow posts relevant to Java security. Second, we will discuss the recommended principles of API usage by security experts. Third, to correlate the principles with existing practice, we will also discuss some API misuse examples for the hash digest, message encryption and decryption, key generation, and SSL/TLS connection. Fourth, we will ask participants to examine extra code examples and discuss the security property of each example. Finally, We will give an overview of the available tools and resources, demonstrate a tool named RIGORITYJ that we recently developed to automatically detect API misuse in Java. We will also help participants install and use RIGORITYJ on their own machines and ask them for trials.
机译:各种软件库和框架提供各种API来支持安全编码。然而,滥用这些API可以花费巨大的开发时间和精力,安全漏洞的软件,而导致像在服务器上的数据泄露或拒绝服务(DoS)的严重后果。事先没有教程受教育者人们对安全编码的最佳实践,应该避免的陷阱,以及不安全的代码的补救措施。为了提高开发者的安全意识,提高他们的软件产品的质量,我们提出了一个90分钟的教程,教参加了Java的原则和实践安全编码。在本教程中,我们将介绍使用安全API的原理,分析典型API滥用的案例来说明原因及影响。我们还将介绍我们最近开发的自动检测的Java API误用的工具。有五个部分在我们的教程。为了揭示安全编码实践的存在状态,我们将首先介绍我们最近就有关Java安全的StackOverflow职位研究的结果。其次,我们将通过安全专家讨论API使用的推荐原则。第三,现行惯例的原则相关,我们还将讨论哈希一些API滥用的例子消化,消息加密和解密,密钥生成和SSL / TLS连接。第四,我们会要求与会者审查额外的代码示例和讨论每个实例的安全性能。最后,我们将给出可用的工具和资源的概况,展示了一个名为RIGORITYJ,我们最近开发的自动检测的Java API误用的工具。我们也将帮助参与者安装在自己的机器使用RIGORITYJ,并要求他们对试验。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号