Toward effective secure code reviews: an empirical study of security-related coding weaknesses.
Wachiraphan CharoenwetPatanamon ThongtanunamVan-Thuan PhamChristoph TreudePublished in: Empir. Softw. Eng. (2024)
Keyphrases
- security requirements
- security issues
- security mechanisms
- access control
- security protocols
- security analysis
- information security
- coding scheme
- key management
- security measures
- security properties
- sensitive data
- digital rights management
- security services
- error correcting
- authentication scheme
- security level
- data security
- authentication mechanism
- key exchange protocol
- data encryption
- public key cryptosystem
- source code
- provably secure
- security architecture
- error control
- cryptographic protocols
- privacy preserving