{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T17:10:27Z","timestamp":1765041027076,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T00:00:00Z","timestamp":1582329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["CRC 1119 CROSSING"],"award-info":[{"award-number":["CRC 1119 CROSSING"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,2,22]]},"DOI":"10.1145\/3368826.3377905","type":"proceedings-article","created":{"date-parts":[[2020,2,21]],"date-time":"2020-02-21T21:49:28Z","timestamp":1582321768000},"page":"185-198","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["CogniCrypt\n            <sub>\n              <i>GEN<\/i>\n            <\/sub>\n            : generating code for the secure usage of crypto APIs"],"prefix":"10.1145","author":[{"given":"Stefan","family":"Kr\u00fcger","sequence":"first","affiliation":[{"name":"University of Paderborn, Germany"}]},{"given":"Karim","family":"Ali","sequence":"additional","affiliation":[{"name":"University of Alberta, Canada"}]},{"given":"Eric","family":"Bodden","sequence":"additional","affiliation":[{"name":"University of Paderborn, Germany \/ Fraunhofer IEM, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1093\/intqhc\/11.3.187"},{"key":"e_1_3_2_1_2_1","unstructured":"Eric Bodden Stefan Krueger Johannes Spaeth Karim Ali and Mira Mezini. 2018. CVE-2018-12240. Available from Symantec CVE-ID CVE-2018-12240.. https:\/\/support.symantec.com\/us\/en\/article.SYMSA1460. html"},{"key":"e_1_3_2_1_3_1","volume-title":"Practical Evaluation of Static Analysis Tools for Cryptography: Benchmarking Method and Case Study. In 28th IEEE International Symposium on Software Reliability Engineering, ISSRE 2017","author":"Braga Alexandre Melo","year":"2017","unstructured":"Alexandre Melo Braga, Ricardo Dahab, Nuno Antunes, Nuno Laranjeiro, and Marco Vieira. 2017. Practical Evaluation of Static Analysis Tools for Cryptography: Benchmarking Method and Case Study. In 28th IEEE International Symposium on Software Reliability Engineering, ISSRE 2017, Toulouse, France, October 23-26, 2017 . 170\u2013181."},{"key":"e_1_3_2_1_4_1","first-page":"4","article-title":"SUS-A quick and dirty usability scale","volume":"189","author":"Brooke John","year":"1996","unstructured":"John Brooke. 1996. SUS-A quick and dirty usability scale. Usability Evaluation in Industry 189, 194 (1996), 4\u20137.","journal-title":"Usability Evaluation in Industry"},{"key":"e_1_3_2_1_6_1","volume-title":"Evaluation of Cryptography Usage in Android Applications. In International Conference on Bio-inspired Information and Communications Technologies . 83\u201390","author":"Chatzikonstantinou Alexia","year":"2016","unstructured":"Alexia Chatzikonstantinou, Christoforos Ntantogian, Georgios Karopoulos, and Christos Xenakis. 2016. Evaluation of Cryptography Usage in Android Applications. In International Conference on Bio-inspired Information and Communications Technologies . 83\u201390."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516693"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.31"},{"key":"e_1_3_2_1_10_1","volume-title":"Cryptographic Mechanisms: Recommendations and Key Lengths . Technical Report BSI TR-02102-1. BSI.","author":"Information German Federal","year":"2017","unstructured":"German Federal Office for Information Security (BSI). 2017. Cryptographic Mechanisms: Recommendations and Key Lengths . Technical Report BSI TR-02102-1. BSI."},{"key":"e_1_3_2_1_11_1","unstructured":"Martin Fowler. 2005. FluentInterface. https:\/\/martinfowler.com\/bliki\/ FluentInterface.html ."},{"key":"e_1_3_2_1_12_1","unstructured":"Lei Gao. 2005. Latin Squares in Experimental Design. (2005)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382204"},{"key":"e_1_3_2_1_15_1","volume-title":"Vetting SSL Usage in Applications with SSLINT. In IEEE Symposium on Security and Privacy. 519\u2013534","author":"He Boyuan","year":"2015","unstructured":"Boyuan He, Vaibhav Rastogi, Yinzhi Cao, Yan Chen, V. N. Venkatakrishnan, Runqing Yang, and Zhenrui Zhang. 2015. Vetting SSL Usage in Applications with SSLINT. In IEEE Symposium on Security and Privacy. 519\u2013534."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1093\/ije\/24.2.389"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2014.7032504"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.22152\/programming-journal.org\/2019\/3\/2"},{"key":"e_1_3_2_1_19_1","volume-title":"Liu","author":"Kane Christopher","year":"2018","unstructured":"Christopher Kane, Bo Lin, Saksham Chand, and Yanhong A. Liu. 2018. High-level Cryptographic Abstractions. CoRR abs\/1810.09065 (2018)."},{"key":"e_1_3_2_1_20_1","unstructured":"Stefan Krueger Johannes Spaeth Karim Ali Eric Bodden and Mira Mezini. 2019. CrySL Rule Set for JCA. https:\/\/github.com\/ CROSSINGTUD\/Crypto- API- Rules ."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115707"},{"key":"e_1_3_2_1_22_1","volume-title":"European Conference on ObjectOriented Programming (ECOOP) .","author":"Kr\u00fcger Stefan","year":"2018","unstructured":"Stefan Kr\u00fcger, Johannes Sp\u00e4th, Karim Ali, Eric Bodden, and Mira Mezini. 2018. CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. In European Conference on ObjectOriented Programming (ECOOP) ."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2637166.2637237"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016","author":"Ma Siqi","year":"2016","unstructured":"Siqi Ma, David Lo, Teng Li, and Robert H. Deng. 2016. CDRep: Automatic Repair of Cryptographic Misuses in Android Applications. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi\u2019an, China, May 30 - June 3, 2016 . 711\u2013722."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.15760\/comminfolit.2016.10.2.24"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.441"},{"key":"e_1_3_2_1_27_1","volume-title":"Usability and Security Effects of Code Examples on Crypto APIs. In 16th Annual Conference on Privacy, Security and Trust, PST 2018","author":"Mindermann Kai","year":"2018","unstructured":"Kai Mindermann and Stefan Wagner. 2018. Usability and Security Effects of Code Examples on Crypto APIs. In 16th Annual Conference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018 . 1\u20132. https:\/\/www.cryptoexamples.com\/index.html ."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2866614.2866629"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884790"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133977"},{"volume-title":"The problem of the self-report in survey research","author":"Northrup David A","key":"e_1_3_2_1_31_1","unstructured":"David A Northrup. 1997. The problem of the self-report in survey research . Institute for Social Research, York University."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/19361610.2011.580283"},{"key":"e_1_3_2_1_33_1","volume-title":"23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings . 617\u2013630","author":"Oechslin Philippe","year":"2003","unstructured":"Philippe Oechslin. 2003. Making a Faster Cryptanalytic Time-Memory Trade-Off. In Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings . 617\u2013630."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Lucky Onwuzurike and Emiliano De Cristofaro. 2015. Danger is my middle name: experimenting with SSL vulnerabilities in Android apps. 15:1\u201315:6.","DOI":"10.1145\/2766498.2766522"},{"key":"e_1_3_2_1_35_1","unstructured":"Oracle. 2016. Java Cryptography Architecture (JCA). https:\/\/docs.oracle.com\/javase\/8\/docs\/technotes\/guides\/security\/ crypto\/CryptoSpec.html ."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2004.1283943"},{"key":"e_1_3_2_1_37_1","volume-title":"CryptoGuard: Deployment-quality Detection of Java Cryptographic Vulnerabilities. CoRR abs\/1806.06881","author":"Rahaman Sazzadur","year":"2018","unstructured":"Sazzadur Rahaman, Ya Xiao, Ke Tian, Fahad Shaon, Murat Kantarcioglu, and Danfeng Yao. 2018. CryptoGuard: Deployment-quality Detection of Java Cryptographic Vulnerabilities. CoRR abs\/1806.06881 (2018)."},{"key":"e_1_3_2_1_38_1","unstructured":"Siegfried Rasthofer Steven Arzt Robert Hahn Max Kohlhagen and Eric Bodden. 2015. (In)Security of Backend-as-a-Service. In BlackHat Europe 2015 ."},{"key":"e_1_3_2_1_39_1","first-page":"46","article-title":"The one number you need to grow","volume":"81","author":"Reichheld Frederick F","year":"2003","unstructured":"Frederick F Reichheld. 2003. The one number you need to grow. Harvard Business Review 81, 12 (2003), 46\u201355.","journal-title":"Harvard Business Review"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Shuai Shao Guowei Dong Tao Guo Tianchang Yang and Chenjie Shi. 2014. Modelling Analysis and Auto-detection of Cryptographic Misuse in Android Applications. In nternational Conference on Dependable Autonomic and Secure Computing . 75\u201380.","DOI":"10.1109\/DASC.2014.22"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2019.00014"}],"event":{"name":"CGO '20: 18th ACM\/IEEE International Symposium on Code Generation and Optimization","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing","IEEE-CS Computer Society"],"location":"San Diego CA USA","acronym":"CGO '20"},"container-title":["Proceedings of the 18th ACM\/IEEE International Symposium on Code Generation and Optimization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368826.3377905","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368826.3377905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:28Z","timestamp":1750202608000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368826.3377905"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,22]]},"references-count":39,"alternative-id":["10.1145\/3368826.3377905","10.1145\/3368826"],"URL":"https:\/\/doi.org\/10.1145\/3368826.3377905","relation":{},"subject":[],"published":{"date-parts":[[2020,2,22]]},"assertion":[{"value":"2020-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}