Integrated Approach to Detect Vulnerabilities in Source Code
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015

Integrated Approach to Detect Vulnerabilities in Source Code

Monica Catherine S, Geogen George

Nowadays, security breaches are greatly increasing in number. This is one of the major threats that are being faced by most organisations which usually lead to a massive loss. The major cause for these breaches could potentially be the vulnerabilities in software products. Though there are many standard secure coding standards like CERT (Computer Emergency Response Team), software developers fail to utilize them and this leads to an unsecured end product. The difficulty in manual analysis of vulnerabilities in source code is what leads to the evolution of automated analysis tools. Static and dynamic analyses are the two complementary methods used to detect vulnerabilities in source code. Static analysis scans the source code without executing it but dynamic analysis tests the code by executing it. Each has its own unique pros and cons. The proposed approach helps the developers to correct the vulnerabilities in their code by an integrated approach of static and dynamic analysis for C and C++. This eliminates the pros and cons of the existing practices and helps developers in the most efficient way. It deals with common buffer overflow vulnerabilities, format string vulnerabilities and improper input validation. The whole scenario is implemented as a web application.

Keywords: Secure coding, Static analysis, Dynamic analysis, Buffer overflow

Edition: Volume 4 Issue 3, March 2015

Pages: 1759 - 1762

Share this Article

How to Cite this Article?

Monica Catherine S, Geogen George, "Integrated Approach to Detect Vulnerabilities in Source Code", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152471, Volume 4 Issue 3, March 2015, 1759 - 1762

47 PDF Views | 48 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Static analysis'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1797 - 1801

Tool for Converting Source Code to UML Diagrams & Measuring Object Oriented Metrics in OO Java Software

Shubhangi Sakore, Ravina Kudale

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 550 - 554

N-Gram Analysis in SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection

Pagidimarri Venu, Dasu Vaman Ravi Prasad

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1759 - 1762

Integrated Approach to Detect Vulnerabilities in Source Code

Monica Catherine S, Geogen George

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1864 - 1868

Detecting the Rootkit through Dynamic Analysis

D. Suganya Gandhi, S. Suresh Kumar

Share this Article

Similar Articles with Keyword 'Dynamic analysis'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 550 - 554

N-Gram Analysis in SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection

Pagidimarri Venu, Dasu Vaman Ravi Prasad

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 125 - 128

Fault Localization for Client Side Scripting of Web Application

Swati B. Ghawate, S. M. Shinde

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1759 - 1762

Integrated Approach to Detect Vulnerabilities in Source Code

Monica Catherine S, Geogen George

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1864 - 1868

Detecting the Rootkit through Dynamic Analysis

D. Suganya Gandhi, S. Suresh Kumar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 474 - 479

Study of Dataset Feature Filtering of OpCode for Malware Detection Using SVM Training Phase

Bhushan Kinholkar

Share this Article

Similar Articles with Keyword 'Buffer overflow'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 432 - 435

Minimizing Packet Loss Using Congestion Control Scheme for Video Streaming

A. ThamaraiSelvan, R. Sethu Raman

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2651 - 2653

Survey on Congestion Control Mechanism for TCP

Tejashri P. Mane, Snehal Kanade

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1147 - 1150

Enhance QoS of Lossy Wireless Sensor Network by In-Network Data Aggregation

Harshada Kupade, Madhav Ingle

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017

Pages: 1149 - 1157

A Hybrid Approach for Intrusion Detection System

Hussam A. Al-Ameen

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1759 - 1762

Integrated Approach to Detect Vulnerabilities in Source Code

Monica Catherine S, Geogen George

Share this Article
Top