defensive programming


Also found in: Wikipedia.

defensive programming

Writing a secure program. Without security in mind, extensive validation of input is one area that is often overlooked. For example, if a small amount of data is expected as input, but the program accepts any amount, it provides a way for the cracker to insert executable code into the program. Using very clever hacking techniques, this code can be made to run.
Mentioned in ?
References in periodicals archive ?
When measuring the completeness of a test suite, you might determine that it is unnecessary to exercise some coverage targets in a model, such as an upper bound of a Saturation block, or a decision which cannot evaluate to false due to defensive programming.
In a talk on defensive programming, Ark Khasin, a senior software engineer at General Electric, will share real-world techniques deployed in some GE industrial devices that have helped engineers avoid hardware and software glitches and bugs in the field.
The book is organized into five parts: security, defensive programming, reliability, program understandability and programmer misconceptions.
Topics for the October 8 event at the University of Sunderland will include themes on Defensive programming 101, Clean up your JavaScript act, A one-hour developer's view of Windows 8 and even The happy developer - is it a myth?
In addition to testing skills, students are taught the principles of defensive programming, remediation management within the major application vulnerability classes, and how to design secure application environments and architectures.
Incorporate key error prevention practices such as unit testing, defensive programming, code reviews, application-level testing, regression testing and nightly builds -- Change the development culture to embrace code ownership -- Create applications that are portable and reliable -- Decrease the time and expenses associated with development