Integrated Approach to Detect Vulnerabilities in Source Code

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3

Abstract

Nowadays, security breaches are greatly increasing in number. This is one of the major threats that are being faced by most organisations which usually lead to a massive loss. The major cause for these breaches could potentially be the vulnerabilities in software products. Though there are many standard secure coding standards like CERT (Computer Emergency Response Team), software developers fail to utilize them and this leads to an unsecured end product. The difficulty in manual analysis of vulnerabilities in source code is what leads to the evolution of automated analysis tools. Static and dynamic analyses are the two complementary methods used to detect vulnerabilities in source code. Static analysis scans the source code without executing it but dynamic analysis tests the code by executing it. Each has its own unique pros and cons. The proposed approach helps the developers to correct the vulnerabilities in their code by an integrated approach of static and dynamic analysis for C and C++. This eliminates the pros and cons of the existing practices and helps developers in the most efficient way. It deals with common buffer overflow vulnerabilities, format string vulnerabilities and improper input validation. The whole scenario is implemented as a web application.

Authors and Affiliations

Keywords

Related Articles

Deployment of Virtual Resources Using Template Management Technology on Openstack

This Paper actually focuses on the development of template management technology to build virtual resources environments on openstack. We have technologies which deploy a set of virtual resources based on system environm...

Communication Yesterday, Today and Tomorrow

"The need to communicate is part of mans inherent being. Since the beginning of time the human race has communicated using different techniques and methods. Circumstances and available technology have dictated the method...

An Assessment of the Factors that Affect the Productivity and Production of Small Scale Farmers in Three Selected Districts of Zimbabwe

An Assessment of the Factors that Affect the Productivity and Production of Small Scale Farmers in Three Selected Districts of Zimbabwe

Efficacy of Plant Hormone on the Extension of Shelf Life, Postharvest Behaviour and Quality of Kishanbhog Mango (Mangifera indica L.)

Freshly harvested and uniformly ripe mango cultivar of kishanbhog was collected from the experimental mango research garden of BCSIR Laboratories, Rajshahi, Bangladesh during June - July, 2011 and 2012. The application o...

Organizational Justice and Organizational Commitment

The purpose of this study was to analyze the influence of organizational justice toward organizational commitment on Government Employee, Southeast Sulawesi Provincial Offices. The design of this study was explanatory re...

Download PDF file
  • EP ID EP357464
  • DOI -
  • Views 91
  • Downloads 0

How To Cite

(2015). Integrated Approach to Detect Vulnerabilities in Source Code. UNKNOWN, 4(3), -. https://europub.co.uk/articles/-A-357464