Articles, Home

How To Bring Your Java Microservices To The Cloud

All companies are software companies, and businesses will always experience the challenge of keeping integrations between users and applications scalable, productive, fast, and of high quality. To combat this, cloud, microservices, and other modern solutions come up more and more in architectural decisions.

Articles, Home

Java Cryptography Uses in the Wild

[Background] Previous research has shown that developers commonly misusecryptography APIs. [Aim] We have conducted an exploratory study to find out howcrypto APIs are used in open-source Java projects, what types of misuses exist,and why developers make such mistakes. [Method] We used a static analysis toolto analyze hundreds of open-source Java projects that rely on Java CryptographyArchitecture, and manually inspected half of the analysis results to assess thetool results. We also contacted the maintainers of these projects by creatingan issue on the GitHub repository of each project, and discussed the misuseswith developers. [Results] We learned that 85% of Cryptography APIs aremisused, however, not every misuse has severe consequences. Developer feedbackshowed that security caveats in the documentation of crypto APIs are rare,developers may overlook misuses that originate in third-party code, and thecontext where a Crypto API is used should be taken into account. [Conclusion]We conclude that using Crypto APIs is still problematic for developers butblindly blaming them for such misuses may lead to erroneous conclusions.