zicofish / TUM-Crypto

Security labeled Java code examples for usage patterns of cryptographic APIs.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

TUM Crypto

Security labeled Java code examples for usage patterns of cryptographic APIs.

All samples were downloaded from the official Stack Overflow data dump https://archive.org/details/stackexchange.

Please create an issue if you want to discuss the label of a particular sample or if you need additional data. We continually update this repo.

Paper

Please refer to our paper for further info https://www.usenix.org/system/files/sec19-fischer.pdf. We'd be happy for you to cite it in case you use this data in your publication.

author = {Felix Fischer and Huang Xiao and Ching-Yu Kao and Yannick Stachelscheid and Benjamin Johnson and Danial Razar and Paul Fawkesley and Nat Buckley and Konstantin B{\"o}ttinger and Paul Muntean and Jens Grossklags},
title = {Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography},
booktitle = {28th {USENIX} Security Symposium ({USENIX} Security 19)},
year = {2019},
isbn = {978-1-939133-06-9},
address = {Santa Clara, CA},
pages = {339--356},
url = {https://www.usenix.org/conference/usenixsecurity19/presentation/fischer},
publisher = {{USENIX} Association},
month = aug,
}

About

Security labeled Java code examples for usage patterns of cryptographic APIs.


Languages

Language:Java 100.0%Language:Python 0.0%