Downloading: Integrated Approach to Detect Vulnerabilities in Source Code
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Your Article PDF will be Downloaded in Next Seconds

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015

Integrated Approach to Detect Vulnerabilities in Source Code

Monica Catherine S, Geogen George

Nowadays, security breaches are greatly increasing in number. This is one of the major threats that are being faced by most organisations which usually lead to a massive loss. The major cause for these breaches could potentially be the vulnerabilities in software products. Though there are many standard secure coding standards like CERT (Computer Emergency Response Team), software developers fail to utilize them and this leads to an unsecured end product. The difficulty in manual analysis of vulnerabilities in source code is what leads to the evolution of automated analysis tools. Static and dynamic analyses are the two complementary methods used to detect vulnerabilities in source code. Static analysis scans the source code without executing it but dynamic analysis tests the code by executing it. Each has its own unique pros and cons. The proposed approach helps the developers to correct the vulnerabilities in their code by an integrated approach of static and dynamic analysis for C and C++. This eliminates the pros and cons of the existing practices and helps developers in the most efficient way. It deals with common buffer overflow vulnerabilities, format string vulnerabilities and improper input validation. The whole scenario is implemented as a web application.

Keywords: Secure coding, Static analysis, Dynamic analysis, Buffer overflow

Edition: Volume 4 Issue 3, March 2015

Pages: 1759 - 1762

Share this Article

How to Cite this Article?

Monica Catherine S, Geogen George, "Integrated Approach to Detect Vulnerabilities in Source Code", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152471, Volume 4 Issue 3, March 2015, 1759 - 1762



Top