LDRA Ships New TBsecure™ Complete with CERT C Secure Coding Programming Checker

TBsecure and the CERT C standard checker are used to identify security vulnerabilities, detect faults and security standard compliance from networked and Internet connected applications that are vulnerable to attack.

Boston, MA, October 30, 2008 --(PR.com)-- LDRA (Booth 1017), provider of the most complete automated software verification, source code analysis and test tools covering the full development lifecycle, has released its new TBsecure plug-in complete with the Carnegie Mellon Software Engineering Institute (SEI) CERT C secure coding standard. TBsecure identifies security vulnerabilities and enables implementation of the just released CERT C Secure Coding Standard version 1.0. The CERT C v1.0 standard debuts today at Software Development Best Practices in Boston alongside LDRA’s launch of the TBsecure plug-in and its CERT C program checker at Embedded Systems Conference.

LDRA’s TBsecure plugs into TBvision, a module within the LDRA tool suite that enables developers to easily see how the source code performs against security vulnerabilities, fault-detection and adherence to the required quality standards. As its primary role, TBsecure applies the CERT C secure coding rules and relays findings to TBvision, which graphically shows code quality, fault detection and avoidance measures through call graphs, flow graphs and code review reports. Using the TBsecure plug-in, managers, team workers and individual developers are able to collectively monitor the implementation of security metrics in their applications in an easy-to-read, intuitive format.

“With the increased connectivity of software systems, there has been an increase in the number of software security attacks,” noted Robert Secord, Senior Vulnerability Analyst with the SEI CERT program. “Our society has become highly dependent on software applications in mission-, business-, and safety-critical systems. Studies indicate that a majority of vulnerabilities in these systems can be traced back to a set of common programming errors. The CERT C standard aims to reduce these risks through software testing and analysis tools that identify these problems before they enter production code.”

“Without proper security technology, individuals and corporations are increasingly vulnerable to malicious code attacks, fraudulent transactions, and theft-of-service opportunities,” observed Ian Hennell, LDRA Operations Director. “At LDRA, we focus on assisting in the development of zero-defect software. We are thrilled to be the first company to deliver a CERT C compliant programming checker as we believe this new standard will play a significant role in the development of higher quality systems that are more robust and more resistant to attack.”

The CERT C Secure Coding Standard provides rules and recommendations for secure coding in the C programming language. The goal of these rules and recommendations is to eliminate insecure coding practices and undefined behaviors that lead to exploitable vulnerabilities. The application of the secure coding standard leads to higher quality systems that are robust and more resistant to attack. Rules and recommendations included in this CERT C Programming Language Secure Coding Standard are designed to be operating system and platform independent. Once established, these standards can be used as a metric to evaluate source code using an automated process.
Through TBsecure, the LDRA tool suite has been extended to support a wide range of programming rules that enable increased application security using the following classification of security issues:

· Dynamic Memory Allocation (A) concerns: Dynamic memory management is a common source of programming flaws that can lead to security issues such as heap-buffer overflows, dangling pointers, and double-free issues. In particular, memory management encompasses allocating memory, reading and writing to memory, and deallocating memory.

· Vulnerabilities (V): These rules are intended to eliminate insecure coding practices aside from those associated with dynamic memory. Examples of insecure coding practices include array indices out of range and dereferencing a null pointer.

LDRA’s provision of TBsecure and the CERT C secure coding programming checker extends its leadership in programming standards enforcement, also evident in its participation in the development of MISRA C:2004, MISRA C+:2008, and others.

###
Contact
LDRA Software Technology
Mark James
+44 (0)151 649 9300
www.ldra.com
ContactContact
Categories