dc.contributor.author | Blessing, Jenny | |
dc.contributor.author | Specter, Michael A. | |
dc.contributor.author | Weitzner, Daniel J. | |
dc.date.accessioned | 2024-07-08T18:18:11Z | |
dc.date.available | 2024-07-08T18:18:11Z | |
dc.date.issued | 2024-07 | |
dc.identifier.isbn | 979-8-4007-0482-6 | |
dc.identifier.uri | https://hdl.handle.net/1721.1/155457 | |
dc.description.abstract | The security of the Internet and numerous other applications rests on a small number of open-source cryptographic libraries: A vulnerability in any one of them threatens to compromise a significant percentage of web traffic. Despite this potential for security impact, the characteristics and causes of vulnerabilities in cryptographic software are not well understood. In this work, we conduct the first systematic, longitudinal analysis of cryptographic libraries and the vulnerabilities they produce. We collect data from the National Vulnerability Database, individual project repositories and mailing lists, and other relevant sources for all widely used cryptographic libraries.
In our investigation of the causes of these vulnerabilities, we find evidence of a correlation between the complexity of these libraries and their (in)security, empirically demonstrating the potential risks of bloated cryptographic codebases. Among our most interesting findings is that 48.4% of vulnerabilities in libraries written in C and C++ are either primarily caused or exacerbated by memory safety issues, indicating that systems-level bugs are a major contributor to security issues in these systems. Cryptographic design and implementation issues make up 27.5% of vulnerabilities across all libraries, with side-channel attacks providing a further 19.4%. We find substantial variation among core library components in both complexity levels and vulnerabilities produced: for instance, over one-third of vulnerabilities are located in implementations of the SSL/TLS protocols, providing actionable evidence for codebase quality and security improvements in these libraries. | en_US |
dc.publisher | ACM | en_US |
dc.relation.isversionof | 10.1145/3634737.3657012 | en_US |
dc.rights | Creative Commons Attribution | en_US |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | en_US |
dc.source | Association for Computing Machinery | en_US |
dc.title | Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Blessing, Jenny, Specter, Michael A. and Weitzner, Daniel J. 2024. "Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries." | |
dc.contributor.department | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory | |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | |
dc.identifier.mitlicense | PUBLISHER_CC | |
dc.eprint.version | Final published version | en_US |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
dc.date.updated | 2024-07-01T07:57:26Z | |
dc.language.rfc3066 | en | |
dc.rights.holder | The author(s) | |
dspace.date.submission | 2024-07-01T07:57:26Z | |
mit.license | PUBLISHER_CC | |
mit.metadata.status | Authority Work and Publication Information Needed | en_US |