defensive programming


Also found in: Wikipedia.

defensive programming

Writing a secure program. Without security in mind, extensive validation of input is one area that is often overlooked. For example, if a small amount of data is expected as input, but the program accepts any amount, it provides a way for the cracker to insert executable code into the program. Using very clever hacking techniques, this code can be made to run.
Mentioned in ?
References in periodicals archive ?
Instead he teaches rigorous defensive programming using C, that is, creating software that defends itself from malicious activity and defects.
When measuring the completeness of a test suite, you might determine that it is unnecessary to exercise some coverage targets in a model, such as an upper bound of a Saturation block, or a decision which cannot evaluate to false due to defensive programming. A new Reactis feature lets you tag any coverage target in your model to be excluded from coverage tracking.
The book is organized into five parts: security, defensive programming, reliability, program understandability and programmer misconceptions.
Topics for the October 8 event at the University of Sunderland will include themes on Defensive programming 101, Clean up your JavaScript act, A one-hour developer's view of Windows 8 and even The happy developer - is it a myth?.
Other rationales ate to encourage simplicity, which can make code easier to test, to foster defensive programming, and to support the use of standards.