Secure software development: leveraging application call graphs to detect security vulnerabilities

The inconsistency in software development standards frequently leads to vulnerabilities that can jeopardize an application’s cryptographic integrity. This situation can result in incomplete or flawed encryption processes. Vulnerabilities may manifest as missing, bypassed, or improperly executed encr...

Full description

Saved in:
Bibliographic Details
Main Authors: Lei Yan, Guanghuai Zhao, Xiaohui Li, Pengxuan Sun
Format: Article
Language:English
Published: PeerJ Inc. 2025-01-01
Series:PeerJ Computer Science
Subjects:
Online Access:https://peerj.com/articles/cs-2641.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!