You Really Shouldn't Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries

07/11/2021
by   Jenny Blessing, et al.
0

The security of the Internet rests on a small number of open-source cryptographic libraries: a vulnerability in any one of them threatens to compromise a significant percentage of web traffic. Despite this potential for security impact, the characteristics and causes of vulnerabilities in cryptographic software are not well understood. In this work, we conduct the first comprehensive analysis of cryptographic libraries and the vulnerabilities affecting them. We collect data from the National Vulnerability Database, individual project repositories and mailing lists, and other relevant sources for eight widely used cryptographic libraries. Among our most interesting findings is that only 27.2 cryptographic libraries are cryptographic issues while 37.2 are memory safety issues, indicating that systems-level bugs are a greater security concern than the actual cryptographic procedures. In our investigation of the causes of these vulnerabilities, we find evidence of a strong correlation between the complexity of these libraries and their (in)security, empirically demonstrating the potential risks of bloated cryptographic codebases. We further compare our findings with non-cryptographic systems, observing that these systems are, indeed, more complex than similar counterparts, and that this excess complexity appears to produce significantly more vulnerabilities in cryptographic libraries than in non-cryptographic software.

READ FULL TEXT
research
11/21/2019

Revisiting and Evaluating Software Side-channel Vulnerabilities and Countermeasures in Cryptographic Applications

We systematize software side-channel attacks with a focus on vulnerabili...
research
03/12/2022

Characterizing and Understanding Software Security Vulnerabilities in Machine Learning Libraries

The application of machine learning (ML) libraries has been tremendously...
research
06/13/2018

How Usable are Rust Cryptography APIs?

Context: Poor usability of cryptographic APIs is a severe source of vuln...
research
09/22/2022

To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild

Recent studies have revealed that 87 cryptographic APIs have a misuse w...
research
10/22/2018

High-level Cryptographic Abstractions

The interfaces exposed by commonly used cryptographic libraries are clum...
research
09/03/2021

Security Enhancement of Drone Considering the Characteristics of Data Transmitted between Wireless Channels

With the development of the fourth industrial revolution technology, the...
research
09/21/2022

CryptoSolve: Towards a Tool for the Symbolic Analysis of Cryptographic Algorithms

Recently, interest has been emerging in the application of symbolic tech...

Please sign up or login with your details

Forgot password? Click here to reset