defensive programming


Also found in: Wikipedia.

defensive programming

Writing a secure program. Without security in mind, extensive validation of input is one area that is often overlooked. For example, if a small amount of data is expected as input, but the program accepts any amount, it provides a way for the cracker to insert executable code into the program. Using very clever hacking techniques, this code can be made to run.
Mentioned in ?
References in periodicals archive ?
Instead he teaches rigorous defensive programming using C, that is, creating software that defends itself from malicious activity and defects.
When measuring the completeness of a test suite, you might determine that it is unnecessary to exercise some coverage targets in a model, such as an upper bound of a Saturation block, or a decision which cannot evaluate to false due to defensive programming.
The book is organized into five parts: security, defensive programming, reliability, program understandability and programmer misconceptions.
Topics for the October 8 event at the University of Sunderland will include themes on Defensive programming 101, Clean up your JavaScript act, A one-hour developer's view of Windows 8 and even The happy developer - is it a myth?
Other rationales ate to encourage simplicity, which can make code easier to test, to foster defensive programming, and to support the use of standards.
By using defensive programming, corporations can detect software glitches and anomalous control data flows that may indicate viruses.