Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/5270
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKumar, Sachin-
dc.contributor.authorMohapatra, Durga Prasad-
dc.date.accessioned2025-08-07T05:01:46Z-
dc.date.available2025-08-07T05:01:46Z-
dc.date.issued2025-08-
dc.identifier.citation22nd Control Instrumentation Systems conference (CISCON), MIT Manipal, Karnataka, 1-2 August 2025en_US
dc.identifier.urihttp://hdl.handle.net/2080/5270-
dc.descriptionCopyright belongs to the proceeding publisher.en_US
dc.description.abstractCorrectly implementing cryptographic security in software is challenging due to its complexity. This paper introduces a machine learning framework using Abstract Syntax Trees (ASTs) to identify cryptographic API misuse in Java code. The approach includes two models: a Per-Category Model, classifying vulnerabilities into nine specific types, and a Full Model, performing binary (secure/insecure) classification. The Per-Category Model achieved an average accuracy of 80%, effectively identifying issues, especially in Public Key Cryptography (PKC) and Weak Cryptography (WC). The Full Model reached 78% accuracy with an AUC-ROC of 0.87, showing strong overall performance. Compared to traditional static analysis tools detecting only 35% of known issues, our method significantly improves accuracy and reduces false alarms. Leveraging AST-based features and Random Forest classifiers, our framework enhances cryptographic misuse detection, providing developers clearer and more actionable insights, thus promoting secure software development.en_US
dc.subjectCryptographyen_US
dc.subjectAbstract Syntax Treesen_US
dc.subjectMachine Learningen_US
dc.subjectCryptographic API Misuseen_US
dc.titleEnhancing Cryptographic Misuse Detection in Source Code using AST and Machine Learning Techniquesen_US
dc.typeArticleen_US
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
2025_CISCON_SKumar_Enhancing.pdf337.23 kBAdobe PDFView/Open    Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.