Design and Implementation of the Compiler with Secure Coding Rules for Developing Secure Mobile Applications in Memory Usages

Provided by: Science and Development Network (SciDev.Net)
Topic: Mobility
Format: PDF
With the recent dynamic growth of the mobile market, the problem of personal information leakage through mobile applications' weaknesses has become a newly rising problem. Guaranteeing the reliability of input and output data is particularly difficult nowadays because software exchange data across the Internet. There is also a risk of being the target of an arbitrary intruder's malicious attack. Such weaknesses have been the root to software security violations that can cause some serious financial damages. Such weaknesses are the direct causes of software security incidents, which generate critical economic losses. Therefore it is important eliminate weaknesses in the software development stage and these areas such as the secure software development process model are being studied, recently.

Find By Topic