Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,240,063 papers from all fields of science
Search
Sign In
Create Free Account
Secure coding
Securing coding is the practice of developing computer software in a way that guards against the accidental introduction of security vulnerabilities…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Broader (1)
Computer security
Defensive programming
IT risk management
Outline of computer security
Provable security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A System for Seamless Support from Security Requirements Analysis to Security Design Using a Software Security Knowledge Base
A. Hazeyama
,
Hikaru Miyahara
,
+4 authors
Nobukazu Yoshioka
IEEE 27th International Requirements Engineering…
2019
Corpus ID: 209459620
Owing to the widespread use of the internet, software services are being provided to millions of consumers and the importance of…
Expand
Review
2017
Review
2017
Vulnerability Detection in Open Source Software: The Cure and the Cause
Stuart Millar
2017
Corpus ID: 35392861
Abstract — According to Veracode, a Gartner-recognised leader in application security, 44% of applications contain critical…
Expand
2017
2017
Demonstrating a Tool for Injection Attack Prevention in MySQL
Ibéria Medeiros
,
Miguel Beatriz
,
N. Neves
,
M. Correia
Dependable Systems and Networks
2017
Corpus ID: 7005140
Despite the significant efforts put in building more secure web applications, cases of high impact breaches continue to appear…
Expand
2017
2017
Major Web Application Threats for Data Privacy & Security - Detection, Analysis and Mitigation Strategies
Varun Deshpande
,
Mydhili K. Nair
,
Dhrumil Shah
2017
Corpus ID: 64758646
.
2016
2016
Adaption of Integrated Secure Guide for Secure Software Development Lifecycle
Ki-Hyun Lee
,
Y. B. Park
2016
Corpus ID: 64155330
As interests in security increases, several software development lifecycle considering security have been proposed. Actual…
Expand
2014
2014
Semantically-Secure Coding Scheme Achieving the Capacity of a Gaussian Wiretap Channel
Himanshu Tyagi
,
A. Vardy
arXiv.org
2014
Corpus ID: 134610
We extend a recently proposed wiretap coding scheme to the Gaussian wiretap channel and show that it is semantically-secure…
Expand
2013
2013
Guidelines for Discovering and Improving Application Security
Gabriel Avramescu
,
M. Bucicoiu
,
D. Rosner
,
N. Tapus
Computer Science in Cars Symposium
2013
Corpus ID: 18359373
This paper analyzes current threats in computer security for web-based applications with a SQL database. We conduct a penetration…
Expand
2008
2008
Securing Java code: heuristics and an evaluation of static analysis tools
Michael S. Ware
,
C. Fox
SAW '08
2008
Corpus ID: 18729741
A secure coding standard for Java does not exist. Even if a standard did exist, it is not known how well static analysis tools…
Expand
2008
2008
Nested codes for secure transmission
Ruoheng Liu
,
H. V. Poor
,
P. Spasojevic
,
Yingbin Liang
IEEE International Symposium on Personal, Indoor…
2008
Corpus ID: 16164934
This paper investigates the problem of ensuring secure communication through error-correcting coding methods. A practical…
Expand
Highly Cited
2003
Highly Cited
2003
Secure Coding: Principles and Practices
M. Graff
,
Kenneth R. van Wyk
2003
Corpus ID: 106658855
Preface 1. No Straight Thing The Vulnerability Cycle What is an Attack? Why Good People Write Bad Code A Call to Arms 2…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE