Secure software development: leveraging application call graphs to detect security vulnerabilities
The inconsistency in software development standards frequently leads to vulnerabilities that can jeopardize an application’s cryptographic integrity. This situation can result in incomplete or flawed encryption processes. Vulnerabilities may manifest as missing, bypassed, or improperly executed encr...
Saved in:
Main Authors: | Lei Yan, Guanghuai Zhao, Xiaohui Li, Pengxuan Sun |
---|---|
Format: | Article |
Language: | English |
Published: |
PeerJ Inc.
2025-01-01
|
Series: | PeerJ Computer Science |
Subjects: | |
Online Access: | https://peerj.com/articles/cs-2641.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Defense and Security Mechanisms in the Internet of Things: A Review
by: Sabina Szymoniak, et al.
Published: (2025-01-01) -
A reference measurement framework of software security product quality (SPQNFSR)
by: Khalid T. Al‐Sarayreh, et al.
Published: (2021-01-01) -
SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING
by: S. P. Maniraj, et al.
Published: (2024-12-01) -
Efficient and secure electronic evidence exchange scheme for internet of things
by: Yulong Xiao, et al.
Published: (2025-01-01) -
Methodology and software development for auditing information security management systems
by: V. A. Boiprav, et al.
Published: (2022-12-01)