Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,652,918 papers from all fields of science
Search
Sign In
Create Free Account
Secure coding
Securing coding is the practice of developing computer software in a way that guards against the accidental introduction of security vulnerabilities…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Broader (1)
Computer security
Defensive programming
IT risk management
Outline of computer security
Provable security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A System for Seamless Support from Security Requirements Analysis to Security Design Using a Software Security Knowledge Base
A. Hazeyama
,
Hikaru Miyahara
,
+4 authors
Nobukazu Yoshioka
IEEE 27th International Requirements Engineering…
2019
Corpus ID: 209459620
Owing to the widespread use of the internet, software services are being provided to millions of consumers and the importance of…
Expand
2018
2018
Natural and Medical Image Encryption Using Self-Adaptive Permutation and DNA Encoding
Ismat Jarin
,
S. Fattah
,
C. Shahnaz
IEEE International WIE Conference on Electrical…
2018
Corpus ID: 199441699
This paper represents an efficient and secure image encryption technique using DNA encoding and self-adaptive permutation method…
Expand
Review
2017
Review
2017
Vulnerability Detection in Open Source Software: The Cure and the Cause
Stuart Millar
2017
Corpus ID: 35392861
Abstract — According to Veracode, a Gartner-recognised leader in application security, 44% of applications contain critical…
Expand
2017
2017
Major Web Application Threats for Data Privacy & Security - Detection, Analysis and Mitigation Strategies
Varun Deshpande
,
Mydhili K. Nair
,
Dhrumil Shah
2017
Corpus ID: 64758646
.
2016
2016
Adaption of Integrated Secure Guide for Secure Software Development Lifecycle
Ki-Hyun Lee
,
Y. B. Park
2016
Corpus ID: 64155330
As interests in security increases, several software development lifecycle considering security have been proposed. Actual…
Expand
2014
2014
Semantically-Secure Coding Scheme Achieving the Capacity of a Gaussian Wiretap Channel
Himanshu Tyagi
,
A. Vardy
arXiv.org
2014
Corpus ID: 134610
We extend a recently proposed wiretap coding scheme to the Gaussian wiretap channel and show that it is semantically-secure…
Expand
2013
2013
Guidelines for Discovering and Improving Application Security
Gabriel Avramescu
,
M. Bucicoiu
,
D. Rosner
,
N. Tapus
Computer Science in Cars Symposium
2013
Corpus ID: 18359373
This paper analyzes current threats in computer security for web-based applications with a SQL database. We conduct a penetration…
Expand
2012
2012
Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing
Taeseung Lee
,
Giyoun Won
,
Seong-je Cho
,
Namje Park
,
Dongho Won
IFIP International Conference on Network and…
2012
Corpus ID: 31125900
The paper proposes a security testing technique to detect known vulnerabilities of web applications using both static and dynamic…
Expand
2008
2008
Securing Java code: heuristics and an evaluation of static analysis tools
Michael S. Ware
,
C. Fox
SAW '08
2008
Corpus ID: 18729741
A secure coding standard for Java does not exist. Even if a standard did exist, it is not known how well static analysis tools…
Expand
Highly Cited
2003
Highly Cited
2003
Secure Coding: Principles and Practices
M. Graff
,
Kenneth R. van Wyk
2003
Corpus ID: 106658855
Preface 1. No Straight Thing The Vulnerability Cycle What is an Attack? Why Good People Write Bad Code A Call to Arms 2…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE