An analysis of influence of safe programming techniques on applications efficiency and security
Tomasz Kobiałka
tskobialka@gmail.comInstitute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland (Poland)
Abstract
The topics covered in this article are the risks that must be taken into account when developing the software. This article gives you an overview of safeguards against some of the anticipated common security vulnerabilities. Based on the written programs, the impact of the various techniques of safe programming on the performance and security of the application has been analyzed. This article presents both a theoretical description of the protections as well as examples of their technical implementation.
Keywords:
programming; efficiency; securityReferences
[1] K. Sacha, Inżynieria oprogramowania, Helion, Gliwice, 2010.
[2] Sahel Alouneha, Mazen Kharbutlib, Rana AlQuremb, Procedia Computer Science, Volume 21, 2013, 250-256.
[3] Herbert Schildt, Java. Kompendium programisty. Wydanie IX, Helion, Gliwice, 2015
[4] Marcin Lis, Tworzenie bezpiecznych aplikacji internetowych, Helion, Gliwice, 2014.
[5] http://searchsecurity.techtarget.com/ [02-03-2017]
[6] J. C. Foster, Vitaly Osipov, Nish Bhalla, Niels Heinen, Dave Aitel, Buffer Overflow Attacks, 2005, 161-228.
[7] J. Viega, M. Messier, C i C++. Bezpieczne programowanie. Receptury, Helion, Gliwice, 2011.
[8] N. Kalicharan, Java Zaawansowane zastosowania, Helion, Gliwice, 2014.
[9] Grande, J., Boudol, G., Serrano, M., Proceedings of the 17th International Symposium on Principles and Practice of Declarative Programming, PPDP 2015, 149-160.
[10] V. Alessandrini, S. Memory, Application Programming, 2016, 83-99.
[11] Welsch, Y., Schäfer, J., Poetzsch-Heffter, A. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 471-500.
[12] Franz, M., Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12-22.
[2] Sahel Alouneha, Mazen Kharbutlib, Rana AlQuremb, Procedia Computer Science, Volume 21, 2013, 250-256.
[3] Herbert Schildt, Java. Kompendium programisty. Wydanie IX, Helion, Gliwice, 2015
[4] Marcin Lis, Tworzenie bezpiecznych aplikacji internetowych, Helion, Gliwice, 2014.
[5] http://searchsecurity.techtarget.com/ [02-03-2017]
[6] J. C. Foster, Vitaly Osipov, Nish Bhalla, Niels Heinen, Dave Aitel, Buffer Overflow Attacks, 2005, 161-228.
[7] J. Viega, M. Messier, C i C++. Bezpieczne programowanie. Receptury, Helion, Gliwice, 2011.
[8] N. Kalicharan, Java Zaawansowane zastosowania, Helion, Gliwice, 2014.
[9] Grande, J., Boudol, G., Serrano, M., Proceedings of the 17th International Symposium on Principles and Practice of Declarative Programming, PPDP 2015, 149-160.
[10] V. Alessandrini, S. Memory, Application Programming, 2016, 83-99.
[11] Welsch, Y., Schäfer, J., Poetzsch-Heffter, A. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 471-500.
[12] Franz, M., Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12-22.
Kobiałka, T. (2018). An analysis of influence of safe programming techniques on applications efficiency and security . Journal of Computer Sciences Institute, 6, 12–19. https://doi.org/10.35784/jcsi.633
Authors
Tomasz Kobiałkatskobialka@gmail.com
Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland Poland
Statistics
Abstract views: 237PDF downloads: 876
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.