Design and implementation of the compiler with secure coding rules for developing secure mobile applications in memory usages

Yun Sik Son, Yang Sun Lee, Se Man Oh

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

With the recent dynamic growth of the mobile market, the problem of personal information leakage through mobile appl cations' weaknesses has become a newly rising problem. Guaranteeing the reliability of input and output data is particularly difficult nowadays because software exchange data across the internet. There is also a risk of being the target of an arbitrary intruder's malicious attack. Such weaknesses have been the root to software security violations that can cause some serious financial damages. Such weaknesses are the direct causes of software security incidents, which generate critical economic losses. Therefore it is important eliminate weaknesses in the software development stage and these areas such as the secure software development process model are being studied, recently.In this study, a compiler which can examine applications' weaknesses at the software development stage has been designed and implemented based on existing weakness research. The proposed compiler analyzes the weaknesses within a program at the point of compilation, different to the existing development environments which separate compilers and weakness analysis tools. As a result, the new compiler enables mobile applications that are developed in rapid development cycles to be created safely from the very first stages of development.

Original languageEnglish
Pages (from-to)153-168
Number of pages16
JournalInternational Journal of Smart Home
Volume6
Issue number4
StatePublished - Oct 2012

Keywords

  • Compiler
  • Rule checker
  • Secure coding
  • Secure software
  • Software verification

Fingerprint

Dive into the research topics of 'Design and implementation of the compiler with secure coding rules for developing secure mobile applications in memory usages'. Together they form a unique fingerprint.

Cite this