This paper is going to address following areas:
1. How to build simple rules using method and class signatures to identify possible weak links in the source code.
2. How to do source code walking across the entire source base to perform impact analysis.
3. How to use simple tool like AppCodeScan1 or similar utility to perform effective source code analysis to detect possible vulnerability residing in your source base.
Download the paper in PDF format here.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.