Detecting Misuses of Security APIs: A Systematic Review

06/15/2023
by   Zahra Mousavi, et al.
0

Security Application Programming Interfaces (APIs) play a vital role in ensuring software security. However, misuse of security APIs may introduce vulnerabilities that can be exploited by hackers. API design complexities, inadequate documentation and insufficient security training are some of the reasons for misusing security APIs. In order to help developers and organizations, software security community have devised and evaluated several approaches to detecting misuses of security APIs. We rigorously analyzed and synthesized the literature on security APIs misuses for building a body of knowledge on the topic. Our review has identified and discussed the security APIs studied from misuse perspective, the types of reported misuses and the approaches developed to detect misuses and how the proposed approaches have been evaluated. Our review has also highlighted the open research issues for advancing the state-of-the-art of detecting misuse of security APIs.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/08/2022

Software Security during Modern Code Review: The Developer's Perspective

To avoid software vulnerabilities, organizations are shifting security t...
research
08/04/2018

Am I Responsible for End-User's Security? A Programmer's Perspective

Previous research has pointed that software applications should not depe...
research
12/24/2020

Implementation of Security Features in Software Development Phases

Security holds an important role in a software. Most people are not awar...
research
02/21/2020

A Multi-Vocal Review of Security Orchestration

Organizations use diverse types of security solutions to prevent cyberat...
research
02/10/2020

On the Relationship between Software Complexity and Security

This work aims at discussing the complexity aspect of software while dem...
research
04/27/2021

Smells and Refactorings for Microservices Security: A Multivocal Literature Review

Context: Securing microservice-based applications is crucial, as many IT...
research
08/26/2022

Factors Influencing the Organizational Decision to Outsource IT Security: A Review and Research Agenda

IT security outsourcing is the process of contracting a third-party secu...

Please sign up or login with your details

Forgot password? Click here to reset