Esc
Source Code Hardening
Definition
Hardening source code with the intention of making it more difficult to exploit and less error prone.
loading...
Technique Subclasses
There are 10 techniques in this category, Source Code Hardening.
Name | ID | Definition | Synonyms |
---|---|---|---|
Source Code Hardening | D3-SCH | Hardening source code with the intention of making it more difficult to exploit and less error prone. | |
- Integer Range Validation | D3-IRV | Ensuring that an integer is within a valid range. | |
- Memory Block Start Validation | D3-MBSV | Ensuring that a pointer accurately references the beginning of a designated memory block. | |
- Null Pointer Checking | D3-NPC | Checking if a pointer is NULL. | Nil Pointer Checking |
- Pointer Validation | D3-PV | Ensuring that a pointer variable has the required properties for use. | |
- Reference Nullification | D3-RN | Invalidating all pointers that reference a specific memory block, ensuring that the block cannot be accessed or modified after deallocation. | |
- Trusted Library | D3-TL | A trusted library is a collection of pre-verified and secure code modules or components that are used within software applications to perform specific functions. These libraries are considered reliable and have been vetted for security vulnerabilities, ensuring they do not introduce risks into the application. | |
- Variable Initialization | D3-VI | Setting variables to a known value before use. | |
- Variable Type Validation | D3-VTV | Ensuring that a variable has the correct type. | |
- Credential Scrubbing | D3-CS | The systematic removal of hard-coded credentials from source code to prevent accidental exposure and unauthorized access. |
loading...
D3FEND™
A knowledge graph of cybersecurity countermeasures