Investigating Approaches for Memory Leak Detection

Loading...
Thumbnail Image

Date

item.page.authors

Journal Title

Journal ISSN

Volume Title

Publisher

Abstract

Due to the growing use of technology for software processing and security, software is constantly expanding in scope. Because the majority of modern products and services rely on software, software development is an essential task for the advancement of our society. The way to build secure software that maintains legitimate functionality even in the face of suspicious harm is now the most important objective of software engineering. Software developers engage in a variety of activities to develop secure software. This involves designing secure software, testing it for security flaws, and gaining knowledge by utilizing best practices for software engineering. The most essential work done during the development phase is identifying typical software threats and flaws early in the program life cycle, such as buffer overflows and SQL injection, and eliminating possible security vulnerabilities in the product. These may be accomplished by making it simpler and more extensible. The security and quality of specific software artifacts can also be improved by using particular processes. Software requirements and source code analysis, for instance, may be used for misuse scenarios, security requirements, and risk assessments. Additionally, applying various source code techniques to the program code and even the built versions of the code can aid in identifying potential vulnerabilities. Since source code is the artifact that each component of software must have as an end product, source code analysis will be the main focus of this research. Static Code Analysis (SCA) and Dynamic Code Analysis (DCA) are the two primary categories of source code analysis techniques. newlineNow, software vulnerabilities are unavoidable, some of which are fatal and will jeopardize the security of the data. These vulnerabilities have a significant impact on software. The software vulnerability may be mitigated through source code analysis techniques, which reduce the danger of malicious attacks. Various source code analysis tools and techniques

Description

Keywords

Citation

item.page.endorsement

item.page.review

item.page.supplemented

item.page.referenced