Integrated Approach to Detect Vulnerabilities in Source Code
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3
Abstract
Nowadays, security breaches are greatly increasing in number. This is one of the major threats that are being faced by most organisations which usually lead to a massive loss. The major cause for these breaches could potentially be the vulnerabilities in software products. Though there are many standard secure coding standards like CERT (Computer Emergency Response Team), software developers fail to utilize them and this leads to an unsecured end product. The difficulty in manual analysis of vulnerabilities in source code is what leads to the evolution of automated analysis tools. Static and dynamic analyses are the two complementary methods used to detect vulnerabilities in source code. Static analysis scans the source code without executing it but dynamic analysis tests the code by executing it. Each has its own unique pros and cons. The proposed approach helps the developers to correct the vulnerabilities in their code by an integrated approach of static and dynamic analysis for C and C++. This eliminates the pros and cons of the existing practices and helps developers in the most efficient way. It deals with common buffer overflow vulnerabilities, format string vulnerabilities and improper input validation. The whole scenario is implemented as a web application.
Transient Stability Analysis of Multi Machine System
Transient Stability Analysis of Multi Machine System
Perceptions of English Language Teachers and Learners about an Effective English Language Teacher (Eelt) in Kenyan Secondary Schools
"Between January, 2013 and March, 2013, an investigation of the perceptions of teachers and learners of English about an effective English language teacher was carried out. The research involved 10 teachers of English an...
A Mathematical Model of Cervical Cancer in Kenya
"Background In this paper dynamic models for cervical cancer among women with diagnosed and undiagnosed cervical cancer have been constructed. Methods Differential equations for the population of women in each stage o...
Preprocessing and Similarity Matching Trademark Images Based on Color and Shape
The basis of presenting this paper is the retrieval of images based on the color components presented in the query images and similar outer shape. Paper presents matching assesment of BMP images of trademark images by u...
Development of Constant Bit Rate JPEG Image Compression Using Fuzzy Logic
Due to the increase in need of transmission of images in computer, mobile environments, the research in the field of image compression has increased significantly. Image compression plays a important role in digital imag...