Skip to content

Commit

Permalink
add recent updates
Browse files Browse the repository at this point in the history
  • Loading branch information
Anna committed Jun 3, 2023
1 parent 0b9af86 commit cafa21f
Show file tree
Hide file tree
Showing 7 changed files with 172 additions and 27 deletions.
2 changes: 1 addition & 1 deletion config/_default/params.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@

# Appearance

theme: wak
theme: classic
day_night: true
font: 'Rose'
font_size: L
Expand Down
2 changes: 1 addition & 1 deletion content/authors/anna/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ interests:
- Software security
- Go & [it's communities](https://twitter.com/golangFrankfurt)
- Healthy food & green tea
- Yoga and bouldering
- Yoga (incl. [teaching](https://188.webclimber.de/de/courseBooking/course/boulder-yoga-am-samstag)) & bouldering

# Education to show in About widget
education:
Expand Down
75 changes: 75 additions & 0 deletions content/event/applicationsecurity_2022/index.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,75 @@
---
# Documentation: https://wowchemy.com/docs/managing-content/

title: "Workshop: Application Security @ GopherCon"
event: "GopherCon 2022"
event_url: "https://gophercon.com"
location: "Online [Workshop]"
address:
street:
city:
region:
postcode:
country:
summary:
abstract: "## Description
This workshop is for all gophers who not only want to build cool applications, but also want to include security into them. Application security is a complex topic and can be hard to get into, so we will start by taking the first steps into the rabbit hole of (Go) security. Together, we will start with a very simple web application, learn basic security concepts, and focus on how to reinforce our application against attacks in an easy way. To achieve this goal, Anna-Katharina will explain the necessary information of an attack to conduct it. Once you find the vulnerability, we will work together to fix the issue and move forward. By the end of the workshop, you will have a simple web application that is protected against basic web security attacks, like CSRF or SQL Injection, and supply chain attacks.
## What a student is expected to learn
Students will learn how to reinforce a simple (web) application in Go against basic web security attacks (e.g. CSRF), and pin their dependencies to avoid supply chain attacks. Furthermore, a student will have the chance to run a static analysis against their code base to check for some of the vulnerabilities. During the workshop, every student will be challenged to reflect on their code and understand the diversity and complexity of security.
## Prerequisites
A basic understanding of the Go programming language. Students do not have to be expert Go users, but they are expected to have completed the majority of the Go Tour. An understanding of the basics of web applications is advantageous to easily dig into the code base."

# Talk start and end times.
# End time can optionally be hidden by prefixing the line with `#`.
date: 2022-10-06T00:00:00+00:00
# date_end: 2022-05-16T21:56:12+02:00
all_day: true

# Schedule page publish date (NOT event date).
publishDate: 2022-09-20T20:56:12+02:00

authors: [anna]
tags: [security, golang, GopherConEU, workshop, SQLInjection, misc]

# Is this a featured event? (true/false)
featured: true

# Featured image
# To use, add an image named `featured.jpg/png` to your page's folder.
# Focal points: Smart, Center, TopLeft, Top, TopRight, Left, Right, BottomLeft, Bottom, BottomRight.
image:
caption: ""
focal_point: ""
preview_only: false

# Custom links (optional).
# Uncomment and edit lines below to show custom links.
# links:
# - name: Follow
# url: https://twitter.com
# icon_pack: fab
# icon: twitter

# Optional filename of your slides within your event's folder or a URL.
url_slides:

url_code:
url_pdf:
url_video:

# Markdown Slides (optional).
# Associate this event with Markdown slides.
# Simply enter your slide deck's filename without extension.
# E.g. `slides = "example-slides"` references `content/slides/example-slides.md`.
# Otherwise, set `slides = ""`.
slides: ""

# Projects (optional).
# Associate this post with one or more of your projects.
# Simply enter your project's folder or file name without extension.
# E.g. `projects = ["internal-project"]` references `content/project/deep-learning/index.md`.
# Otherwise, set `projects = []`.
projects: []
---
25 changes: 1 addition & 24 deletions content/event/taint_2022/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ url_slides: 202207_GopherConEU.pdf

url_code: https://github.com/akwick/taint-analysis-go-gopherconeu22
url_pdf:
url_video:
url_video: https://t.co/Z3FRW9qS3q

# Markdown Slides (optional).
# Associate this event with Markdown slides.
Expand All @@ -67,26 +67,3 @@ slides: ""
projects: []
---

![Anna on stage with the summary slide in the background](IMG_6715.JPG)

## My Thoughts about the Talk

<blockquote class="twitter-tweet" data-dnt="true"><p lang="en" dir="ltr">Some thoughts about my <a href="https://twitter.com/gopherconeu?ref_src=twsrc%5Etfw">@gopherconeu</a> talk today.<br>📄 Slides, code, and impressions are now available online: <a href="https://t.co/65DgbHjq9y">https://t.co/65DgbHjq9y</a> <br><br>📸 by my partner. <a href="https://twitter.com/hashtag/golang?src=hash&amp;ref_src=twsrc%5Etfw">#golang</a> <a href="https://twitter.com/hashtag/gopherconEU?src=hash&amp;ref_src=twsrc%5Etfw">#gopherconEU</a> <a href="https://t.co/Pw1HsPOVt6">pic.twitter.com/Pw1HsPOVt6</a></p>&mdash; Anna-Katharina Wickert @GophetConEU (@akwickert) <a href="https://twitter.com/akwickert/status/1553823903528665088?ref_src=twsrc%5Etfw">July 31, 2022</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>

## Twitter Impressions of the Talk

<blockquote class="twitter-tweet" data-dnt="true"><p lang="en" dir="ltr">And now - <a href="https://twitter.com/akwickert?ref_src=twsrc%5Etfw">@akwickert</a>, keeping it safe in <a href="https://twitter.com/hashtag/golang?src=hash&amp;ref_src=twsrc%5Etfw">#golang</a>!<a href="https://twitter.com/hashtag/gopherconEU?src=hash&amp;ref_src=twsrc%5Etfw">#gopherconEU</a> <a href="https://t.co/FBNm4FDqBw">pic.twitter.com/FBNm4FDqBw</a></p>&mdash; GopherCon Europe (@gopherconeu) <a href="https://twitter.com/gopherconeu/status/1553722827571970050?ref_src=twsrc%5Etfw">July 31, 2022</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>

<blockquote class="twitter-tweet" data-dnt="true"><p lang="en" dir="ltr">Great talk <a href="https://twitter.com/akwickert?ref_src=twsrc%5Etfw">@akwickert</a> ✨✨ <a href="https://twitter.com/gopherconeu?ref_src=twsrc%5Etfw">@gopherconeu</a> <a href="https://twitter.com/hashtag/gopherconEU?src=hash&amp;ref_src=twsrc%5Etfw">#gopherconEU</a> <a href="https://t.co/0knjdk2GF5">pic.twitter.com/0knjdk2GF5</a></p>&mdash; Acyony (@bonekdecroche) <a href="https://twitter.com/bonekdecroche/status/1553731474167398400?ref_src=twsrc%5Etfw">July 31, 2022</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>

<blockquote class="twitter-tweet" data-dnt="true"><p lang="en" dir="ltr">Great talk by <a href="https://twitter.com/akwickert?ref_src=twsrc%5Etfw">@akwickert</a> ! I learned a lot about security, go, and new terminology too! <a href="https://t.co/OvxFJlpSjv">pic.twitter.com/OvxFJlpSjv</a></p>&mdash; Marian Montagnino (@mmontagnino) <a href="https://twitter.com/mmontagnino/status/1553731741046669312?ref_src=twsrc%5Etfw">July 31, 2022</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>

<blockquote class="twitter-tweet" data-dnt="true"><p lang="en" dir="ltr">Thank you <a href="https://twitter.com/akwickert?ref_src=twsrc%5Etfw">@akwickert</a> for the shout out to <a href="https://twitter.com/ecosia?ref_src=twsrc%5Etfw">@ecosia</a> at <a href="https://twitter.com/gopherconeu?ref_src=twsrc%5Etfw">@gopherconeu</a> ❤️ loving listening to your talk about static analysis. It&#39;s inspirational to see you achieving your speaker goals on stage 🚀🤩<a href="https://twitter.com/hashtag/gopherconEU?src=hash&amp;ref_src=twsrc%5Etfw">#gopherconEU</a> <a href="https://t.co/E2sfDRYJPH">pic.twitter.com/E2sfDRYJPH</a></p>&mdash; Jessica Greene (@sleepypioneer) <a href="https://twitter.com/sleepypioneer/status/1553722752095379457?ref_src=twsrc%5Etfw">July 31, 2022</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>

<blockquote class="twitter-tweet" data-dnt="true"><p lang="en" dir="ltr"><a href="https://twitter.com/akwickert?ref_src=twsrc%5Etfw">@akwickert</a> is here to talk to us about static analysis and taint analysis. Looking forward to this one! <a href="https://twitter.com/gopherconeu?ref_src=twsrc%5Etfw">@gopherconeu</a> <a href="https://t.co/jlBWlVnxf5">pic.twitter.com/jlBWlVnxf5</a></p>&mdash; the ol&#39; tea-leg (@tealeg) <a href="https://twitter.com/tealeg/status/1553721876861575168?ref_src=twsrc%5Etfw">July 31, 2022</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>

<blockquote class="twitter-tweet" data-dnt="true"><p lang="en" dir="ltr">Shout out to <a href="https://twitter.com/dgryski?ref_src=twsrc%5Etfw">@dgryski</a> during <a href="https://twitter.com/hashtag/gopherconEU?src=hash&amp;ref_src=twsrc%5Etfw">#gopherconEU</a> talk on taint analyses. <a href="https://t.co/LBtA4JE3T4">pic.twitter.com/LBtA4JE3T4</a></p>&mdash; Lili Cosic (@LiliCosic) <a href="https://twitter.com/LiliCosic/status/1553725764926935040?ref_src=twsrc%5Etfw">July 31, 2022</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>

<blockquote class="twitter-tweet" data-dnt="true"><p lang="en" dir="ltr">Love seeing <a href="https://twitter.com/dgryski?ref_src=twsrc%5Etfw">@dgryski</a> show up in a <a href="https://twitter.com/gopherconeu?ref_src=twsrc%5Etfw">@gopherconeu</a> talking being given by <a href="https://twitter.com/akwickert?ref_src=twsrc%5Etfw">@akwickert</a>. <a href="https://twitter.com/hashtag/golang?src=hash&amp;ref_src=twsrc%5Etfw">#golang</a> <a href="https://t.co/oaqU2XRtXD">pic.twitter.com/oaqU2XRtXD</a></p>&mdash; William (Bill) Kennedy (@goinggodotnet) <a href="https://twitter.com/goinggodotnet/status/1553725630767894534?ref_src=twsrc%5Etfw">July 31, 2022</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>

<blockquote class="twitter-tweet" data-dnt="true"><p lang="en" dir="ltr">Some great words about <a href="https://twitter.com/gopherconeu?ref_src=twsrc%5Etfw">@gopherconeu</a> and I am flattered to be included in your list of great talks. ☺️ <a href="https://t.co/8dYVVaaAvB">https://t.co/8dYVVaaAvB</a></p>&mdash; Anna-Katharina Wickert (@akwickert) <a href="https://twitter.com/akwickert/status/1555275848630009856?ref_src=twsrc%5Etfw">August 4, 2022</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ publication_types: ["3"]

# Publication name and optional abbreviated publication name.
publication: accepted at *MSR 2022 Registered Reports Track* as In-Principal Acceptance (IPA)
publication_short: In *MSR*
publication_short: In *MSR'22*

abstract: Context Cryptographic APIs are often misused in real-world applications. Therefore, many cryptographic API misuse detection tools have been introduced. However, there exists no established reference benchmark for a fair and comprehensive comparison and evaluation of these tools. While there are benchmarks, they often only address a subset of the domain or were only used to evaluate a subset of existing misuse detection tools. Objective To fairly compare cryptographic API misuse detection tools and to drive future development in this domain, we will devise such a benchmark. Openness and transparency in the generation process are key factors to fairly generate and establish the needed benchmark. Method We propose an approach where we derive the benchmark generation methodology from the literature which consists of general best practices in benchmarking and domain-specific benchmark generation. A part of this methodology is transparency and openness of the generation process, which is achieved by pre-registering this work. Based on our methodology we design CamBench, a fair "Cryptographic API Misuse Detection Tool Benchmark Suite". We will implement the first version of CamBench limiting the domain to Java, the JCA, and static analyses. Finally, we will use CamBench to compare current misuse detection tools and compare CamBench to related benchmarks of its domain.

Expand Down
7 changes: 7 additions & 0 deletions content/publication/to-fix-or-not-to-fix/cite.bib
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
@article{wickert2022tofixornottofix,
title={To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild},
author={Wickert, Anna-Katharina and Baumg{\"a}rtner, Lars and Schlichtig, Michael and Narasimhan, Krishna and Mezini, Mira}
year={2022},
note={accepted at TRUSTCOM'22},
pages={8}
}
86 changes: 86 additions & 0 deletions content/publication/to-fix-or-not-to-fix/index.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,86 @@
---
title: "To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild"

# Authors
# If you created a profile for a user (e.g. the default `admin` user), write the username (folder name) here
# and it will be replaced with their full name and linked to their profile.
authors:
- anna
- Lars Baumgärtner
- Michael Schlichtig
- Krishna Narasimhan
- Mira Mezini


date: "2022-10"
#doi: ""

# Schedule page publish date (NOT publication's date).
publishDate: "2022-09-20T00:00:00Z"

# Publication type.
# Legend: 0 = Uncategorized; 1 = Conference paper; 2 = Journal article;
# 3 = Preprint / Working Paper; 4 = Report; 5 = Book; 6 = Book section;
# 7 = Thesis; 8 = Patent
publication_types: ["1"]

# Publication name and optional abbreviated publication name.
publication: In *2022 IEEE 21th IEEE International Conference on Trust, Security and Privacy in Computing and Communications*
publication_short: In *TRUSTCOM'22*

abstract: Recent studies have revealed that 87 % to 96 % of the Android apps using cryptographic APIs have a misuse which may cause security vulnerabilities. As previous studies did not conduct a qualitative examination of the validity and severity of the findings, our objective was to understand the findings in more depth. We analyzed a set of 936 open-source Java applications for cryptographic misuses. Our study reveals that 88.10 % of the analyzed applications fail to use cryptographic APIs securely. Through our manual analysis of a random sample, we gained new insights into effective false positives. For example, every fourth misuse of the frequently misused JCA class MessageDigest is an effective false positive due to its occurrence in a non-security context. As we wanted to gain deeper insights into the security implications of these misuses, we created an extensive vulnerability model for cryptographic API misuses. Our model includes previously undiscussed attacks in the context of cryptographic APIs such as DoS attacks. This model reveals that nearly half of the misuses are of high severity, e.g., hard-coded credentials and potential Man-in-the-Middle attacks.

# Summary. An optional shortened abstract.
# summary: Lorem ipsum dolor sit amet, consectetur adipiscing elit. Duis posuere tellus ac convallis placerat. Proin tincidunt magna sed ex sollicitudin condimentum.

tags: [cryptography, API misuse, static analysis, false positives]

# Display this page in the Featured widget?
featured: false

# Custom links (uncomment lines below)
# links:
# - name: Custom Link
# url: http://example.org

url_pdf: ''
url_code: ''
url_dataset: 'https://doi.org/10.6084/m9.figshare.21178243'
url_poster: ''
url_project: ''
url_slides: ''
url_source: ''
url_video: ''

# Featured image
# To use, add an image named `featured.jpg/png` to your page's folder.
# image:
# caption: 'The overview slide from the presentation presenting an insecure code example, the approach to create the data set, the evaluation results, and future research ideas as well as the URL to the data set.'
# focal_point: ""
# preview_only: false

# Associated Projects (optional).
# Associate this publication with one or more of your projects.
# Simply enter your project's folder or file name without extension.
# E.g. `internal-project` references `content/project/internal-project/index.md`.
# Otherwise, set `projects: []`.
# projects:
# - example

# Slides (optional).
# Associate this publication with Markdown slides.
# Simply enter your slide deck's filename without extension.
# E.g. `slides: "example"` references `content/slides/example/index.md`.
# Otherwise, set `slides: ""`.
# slides: example

# {{% callout note %}}
# Click the *Cite* button above to demo the feature to enable visitors to import publication metadata into their reference management software.
# {{% /callout %}}
#
# {{% callout note %}}
# Create your slides in Markdown - click the *Slides* button to check out the example.
# {{% /callout %}}
#
# Supplementary notes can be added here, including [code, math, and images](https://wowchemy.com/docs/writing-markdown-latex/).
---

0 comments on commit cafa21f

Please sign in to comment.