ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2007.01061
  4. Cited By
CRYLOGGER: Detecting Crypto Misuses Dynamically

CRYLOGGER: Detecting Crypto Misuses Dynamically

2 July 2020
Luca Piccolboni
G. D. Guglielmo
L. Carloni
S. Sethumadhavan
ArXiv (abs)PDFHTML

Papers citing "CRYLOGGER: Detecting Crypto Misuses Dynamically"

11 / 11 papers shown
"MCP Does Not Stand for Misuse Cryptography Protocol": Uncovering Cryptographic Misuse in Model Context Protocol at Scale
"MCP Does Not Stand for Misuse Cryptography Protocol": Uncovering Cryptographic Misuse in Model Context Protocol at Scale
Biwei Yan
Yue J. Zhang
Minghui Xu
Hao Wu
Yechao Zhang
Kun Li
Guoming Zhang
Xiuzhen Cheng
140
1
0
03 Dec 2025
From base cases to backdoors: An Empirical Study of Unnatural Crypto-API Misuse
From base cases to backdoors: An Empirical Study of Unnatural Crypto-API Misuse
Victor Olaiya
Adwait Nadkarni
182
0
0
15 Oct 2025
Automatic Generation of a Cryptography Misuse Taxonomy Using Large Language Models
Automatic Generation of a Cryptography Misuse Taxonomy Using Large Language Models
Yang Zhang
Wenyi Ouyang
Yi Zhang
Liang Cheng
Chen Henry Wu
Wenxin Hu
194
0
0
13 Sep 2025
Cryptoscope: Analyzing cryptographic usages in modern software
Cryptoscope: Analyzing cryptographic usages in modern software
Micha Moffie
Omer Boehm
Anatoly Koyfman
Eyal Bin
Efrayim Sztokman
Sukanta Bhattacharjee
Meghnath Saha
James McGugan
154
3
0
25 Mar 2025
ChatGPT's Potential in Cryptography Misuse Detection: A Comparative
  Analysis with Static Analysis Tools
ChatGPT's Potential in Cryptography Misuse Detection: A Comparative Analysis with Static Analysis ToolsInternational Symposium on Empirical Software Engineering and Measurement (ESEM), 2024
Ehsan Firouzi
Mohammad Ghafari
Mike Ebrahimi
377
12
0
10 Sep 2024
Beyond Static Pattern Matching? Rethinking Automatic Cryptographic API Misuse Detection in the Era of LLMs
Beyond Static Pattern Matching? Rethinking Automatic Cryptographic API Misuse Detection in the Era of LLMs
Yifan Xia
Zichen Xie
Peiyu Liu
Kangjie Lu
Yan Liu
Wenhai Wang
Shouling Ji
288
10
0
23 Jul 2024
Time to Separate from StackOverflow and Match with ChatGPT for
  Encryption
Time to Separate from StackOverflow and Match with ChatGPT for EncryptionJournal of Systems and Software (JSS), 2024
Ehsan Firouzi
Mohammad Ghafari
SILM
313
10
0
10 Jun 2024
To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild
To Fix or Not to Fix: A Critical Study of Crypto-misuses in the WildInternational Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2022
A. Wickert
Lars Baumgärtner
Michael Schlichtig
Krishna Narasimhan
Mira Mezini
226
8
0
22 Sep 2022
A Longitudinal Study of Cryptographic API: a Decade of Android Malware
A Longitudinal Study of Cryptographic API: a Decade of Android MalwareInternational Conference on Security and Cryptography (SECRYPT), 2022
Adam Janovsky
Davide Maiorca
Dominik Macko
Vashek Matyás
Giorgio Giacinto
283
3
0
11 May 2022
Evaluation of Static Vulnerability Detection Tools with Java
  Cryptographic API Benchmarks
Evaluation of Static Vulnerability Detection Tools with Java Cryptographic API Benchmarks
Sharmin Afrose
Ya Xiao
Sazzadur Rahaman
B. Miller
Danfeng
D. Yao
ELM
210
32
0
07 Dec 2021
FluentCrypto: Cryptography in Easy Mode
FluentCrypto: Cryptography in Easy Mode
Simon Kafader
Mohammad Ghafari
133
13
0
16 Aug 2021
1
Page 1 of 1