2017
DOI: 10.1016/j.neucom.2015.11.139
|View full text |Cite
|
Sign up to set email alerts
|

A secure-coding and vulnerability check system based on smart-fuzzing and exploit

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 3 publications
0
9
0
Order By: Relevance
“…There are some different approached for safe coding which are distrust user input, input validation and magic switches and some tools to perform automatic source code analysis Rats, Flawfinder and ITS4. From the existing studies we conclude that Agrawal, A et al [41], Kang and Park [38], Zhu et al [37] useful approaches in secure programming. The methods of secure programming is summarized year wise shows in the Fig.…”
Section: ) Discussionmentioning
confidence: 86%
See 2 more Smart Citations
“…There are some different approached for safe coding which are distrust user input, input validation and magic switches and some tools to perform automatic source code analysis Rats, Flawfinder and ITS4. From the existing studies we conclude that Agrawal, A et al [41], Kang and Park [38], Zhu et al [37] useful approaches in secure programming. The methods of secure programming is summarized year wise shows in the Fig.…”
Section: ) Discussionmentioning
confidence: 86%
“…They have employed an interactive tool for prototype static investigation similarly as a module for Java in Eclipse. Kang and Park [38] suggested a smart fumigation system made in connection with the black box and white box test that could effectively detect/distinguish software weaknesses.…”
Section: A Secure Programmingmentioning
confidence: 99%
See 1 more Smart Citation
“…The first fuzz testing tool was developed by Miller et al [2] for testing the reliability of UNIX tools. It has been proven useful and successful for discovering vulnerabilities in software which may not be found by other techniques [13], [14]. There are no accepted guidelines in the literature for the fuzz testing technique.…”
Section: Related Workmentioning
confidence: 99%
“…Some of the most relevant security breaches are those related to malicious code within files [6], or even software code bugs. The use of open source software forces us to face various problems based on the weaknesses of open source, such as the weakness of Heartbleed ‘OpenSSL’ [7]. In the healthcare sector, special attention is dedicated to data security [8], and therefore more security checks are recommended if we use open source software [9, 10].…”
Section: Introductionmentioning
confidence: 99%