In this repository, we have linked the supplementary appendix files, source code of MASC, mutated apps, and tool results. Because of the space limitations of GitHub Large File System (LFS) we could not put everything in the same, monolithic repository.
- Online Appendix (PDF, in this repository)
- Source code of MASC - [Link] (separately maintained repository)
- APKs of Android Applications Mutated using MASC - [Link]
- Source code of Android Applications Mutated using Exhaustive Scope of MASC - [Link]
- Source code of Android Applications Mutated using Similarity Scope of MASC - [Link]
- Crypto-detector analysis Results - [Part 1]
- CodeQL
- CryptoGuard
- FindSecBugs
- ShiftLeft
- QARK
- CogniCrypt with CrySL
- Crypto-detector analysis Results - [Part 2]
- A. S. Ami, N. Cooper, K. Kafle, K. Moran, D. Poshyvanyk, and A. Nadkarni, “Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques,” in 2022 IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, USA, May 2022, pp. 397–414, doi: 10.1109/SP46214.2022.9833582 [Online]. Available at: https://ieeexplore.ieee.org/document/9833582
- A. S. Ami et al., “MASC: A Tool for Mutation-Based Evaluation of Static Crypto-API Misuse Detectors,” in Proceedings of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE’23), Demonstration Track, San Francisco, Dec. 2023, doi: 10.1145/3611643.3613099.