Cryptography Vulnerabilities on HackerOne

Previous studies have shown that cryptography is hard for developers to use and misusing cryptography leads to severe security vulnerabilities. We studied relevant vulnerability reports on the HackerOne bug bounty platform to understand what types of cryptography vulnerabilities exist in the wild. We extracted eight themes of vulnerabilities from the vulnerability reports and discussed their real-world implications and mitigation strategies. We hope that our findings alert developers, familiarize them with the dire consequences of cryptography misuses, and support them in avoiding such mistakes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/05/2022

An Exploratory Study on Regression Vulnerabilities

Background: Security regressions are vulnerabilities introduced in a pre...
research
07/22/2020

Set It and Forget It! Turnkey ECC for Instant Integration

Historically, Elliptic Curve Cryptography (ECC) is an active field of ap...
research
08/05/2019

The Impact of Developer Experience in Using Java Cryptography

Previous research has shown that crypto APIs are hard for developers to ...
research
11/30/2022

Unsafe at Any Copy: Name Collisions from Mixing Case Sensitivities

File name confusion attacks, such as malicious symbolic links and file s...
research
08/16/2021

Hurdles for Developers in Cryptography

Prior research has shown that cryptography is hard to use for developers...
research
08/16/2021

FluentCrypto: Cryptography in Easy Mode

Research has shown that cryptography concepts are hard to understand for...
research
09/29/2021

Worrisome Patterns in Developers: A Survey in Cryptography

We surveyed 97 developers who had used cryptography in open-source proje...

Please sign up or login with your details

Forgot password? Click here to reset