Jump to ratings and reviews
Rate this book

Secure Programming with Static Analysis

Rate this book
This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. The First Expert Guide to Static Analysis for Software Security!   Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review their work with a fine-toothed comb and uncover the kinds of errors that lead directly to security vulnerabilities. Now, there’s a complete guide to static how it works, how to integrate it into the software development processes, and how to make the most of it during security code review. Static analysis experts Brian Chess and Jacob West look at the most common types of security defects that occur today. They illustrate main points using Java and C code examples taken from real-world security incidents, showing how coding errors are exploited, how they could have been prevented, and how static analysis can rapidly uncover similar mistakes. This book is for everyone concerned with building more secure developers, security engineers, analysts, and testers.   Coverage     Why conventional bug-catching often misses security problems   How static analysis can help programmers get security right   The critical attributes and algorithms that make or break a static analysis tool   36 techniques for making static analysis more effective on your code   More than 70 types of serious security vulnerabilities, with specific solutions   Example vulnerabilities from Firefox, OpenSSH, MySpace, eTrade, Apache httpd, and many more   Techniques for handling untrusted input   Eliminating buffer tactical and strategic approaches   Avoiding errors specific to Web applications, Web services, and Ajax   Security-aware logging, debugging, and error/exception handling   Creating, maintaining, and sharing secrets and confidential information   Detailed tutorials that walk you through the static analysis process   “We designed Java so that it could be analyzed statically. This book shows you how to apply advanced static analysis techniques to create more secure, more reliable software.” –Bill Joy, Co-founder of Sun Microsystems, co-inventor of the Java programming language   “'Secure Programming with Static Analysis' is a great primer on static analysis for security-minded developers and security practitioners. Well-written, easy to read, tells you what you need to know.” –David Wagner, Associate Professor, University of California Berkeley   “Software developers are the first and best line of defense for the security of their code. This book gives them the security development knowledge and the tools they need in order to eliminate vulnerabilities before they move into the final products that can be exploited.” –Howard A. Schmidt, Former White House Cyber Security Advisor   BRIAN CHESS is Founder and Chief Scientist of Fortify Software, where his research focuses on practical methods for creating secure systems. He holds a Ph.D. in Computer Engineering from University of California Santa Cruz, where he studied the application of static analysis to finding security-related code defects.   JACOB WEST manages Fortify Software’s Security Research Group, which is responsible for building security knowledge into Fortify’s products. He brings expertise in numerous programming languages, frameworks, and styles together with deep knowledge about how real-world systems fail.   CD contains a working demonstration version of Fortify Software’s Source Code Analysis (SCA) product; extensive Java and C code samples; and the tutorial chapters from the book in PDF format.

Kindle Edition

First published July 9, 2007

5 people are currently reading
94 people want to read

About the author

Brian Chess

2 books

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
5 (27%)
4 stars
7 (38%)
3 stars
3 (16%)
2 stars
2 (11%)
1 star
1 (5%)
Displaying 1 - 2 of 2 reviews
Profile Image for OJ.
13 reviews
January 20, 2013
This was an enjoyable read. It felt more like a refresher with some new bits and pieces rather than a totally mind blowing educational experience, but I put that down to background and interest in this area rather than the book's quality.

I would recommend this to people who are new to information security and have an interest in writing more secure code, but if you're looking for more advanced material then perhaps go elsewhere.

The book had a strong influence from Fortify, which is to be expected given the authors. This is good and bad. I the while I certainly don't regret reading it.
Displaying 1 - 2 of 2 reviews

Can't find what you're looking for?

Get help and learn more about the design.