An analysis of influence of safe programming techniques on applications efficiency and security


Abstract

The topics covered in this article are the risks that must be taken into account when developing the software. This article gives you an overview of safeguards against some of the anticipated common security vulnerabilities. Based on the written programs, the impact of the various techniques of safe programming on the performance and security of the application has been analyzed. This article presents both a theoretical description of the protections as well as examples of their technical implementation.


Keywords

programming; efficiency; security

[1] K. Sacha, Inżynieria oprogramowania, Helion, Gliwice, 2010.
[2] Sahel Alouneha, Mazen Kharbutlib, Rana AlQuremb, Procedia Computer Science, Volume 21, 2013, 250-256.
[3] Herbert Schildt, Java. Kompendium programisty. Wydanie IX, Helion, Gliwice, 2015
[4] Marcin Lis, Tworzenie bezpiecznych aplikacji internetowych, Helion, Gliwice, 2014.
[5] http://searchsecurity.techtarget.com/ [02-03-2017]
[6] J. C. Foster, Vitaly Osipov, Nish Bhalla, Niels Heinen, Dave Aitel, Buffer Overflow Attacks, 2005, 161-228.
[7] J. Viega, M. Messier, C i C++. Bezpieczne programowanie. Receptury, Helion, Gliwice, 2011.
[8] N. Kalicharan, Java Zaawansowane zastosowania, Helion, Gliwice, 2014.
[9] Grande, J., Boudol, G., Serrano, M., Proceedings of the 17th International Symposium on Principles and Practice of Declarative Programming, PPDP 2015, 149-160.
[10] V. Alessandrini, S. Memory, Application Programming, 2016, 83-99.
[11] Welsch, Y., Schäfer, J., Poetzsch-Heffter, A. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 471-500.
[12] Franz, M., Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12-22.
Download

Published : 2018-03-30


Kobiałka, T. (2018). An analysis of influence of safe programming techniques on applications efficiency and security . Journal of Computer Sciences Institute, 6, 12-19. https://doi.org/10.35784/jcsi.633

Tomasz Kobiałka  tskobialka@gmail.com
Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland  Poland