June / July 2014


NewEdition
News 

A lot has happened so far this summer. You may have seen the recent Secure Coding Update concerning CERT's new tool. DidFail analyzes sets of Android apps for the leakage of sensitive information from a sensitive source to a restricted sink. The tool is free of charge and available to the public for download.

Will Klieber presented Android Taint Flow Analysis for App Sets (slides) at the ACM SIGPLAN International Workshop on the State of the Art in Java Program Analysis in June.

Amar Bhosale graduated, with a nice Master's thesis, Precise Static Analysis of Taint Flow for Android Application Sets, describing our Android taint flow analysis, in depth.  

David Svoboda and Robert Seacord's presentation Inside the CERT Oracle Secure Coding Standard for Java [CON2368] was accepted at JavaOne 2014. Along with Yozo TODA, Lead Analyst at the JPCERT Coordination Center, David also had a second talk accepted: Anatomy of Another Java Zero-Day Exploit [CON2120]. We are looking forward to another successful JavaOne conference this year.

The SEI report titled Improving the Automated Detection and Analysis of Secure Coding Violations has been published on the SEI website. This paper describes the approach used to add the ability to collect and statistically analyze data regarding coding violations and tool characteristics along with the initial results. The collected data will be used over time to improve the effectiveness of the SCALe analysis.

Aaron Ballman has returned from a successful C++ Standards meeting in Rapperswil, Switzerland, with big plans to update the CERT C++ Secure Coding Standard, which are being formulated on the C++ Coding Standard Development Guidelines page. Please feel free to join the discussion as we plan this major update.

Carol Lallier has finished retrofitting the off-line changes to The CERT C Coding Standard, Second Edition with the wiki, so the wiki now contains the fully synchronized "in development" version of this coding standard. The book remains the official standard against which SCALe assessments will be performed.

We continue to develop the Android secure coding standard on the Android Secure Coding wiki, and thanks go to everyone who has contributed with helpful comments! If you are an Android, Java, or C expert and would like to also contribute to completing this standard, we would be grateful for your input.

Otherwise, we have been quite busy with Source Code Analysis Laboratory (SCALe) assessments, which has led to a smattering of improvements to The CERT Oracle Secure Coding Standard for Java as we evolve rules to be clearer and more precise and to simplify conformance. Many of these changes are listed in the Java section below.
Please enjoy the rest of your summer-get out there and work on your tans!

How are you using the CERT Secure Coding Standards?

As a reader of this eNewsletter, we want to hear from you. Submit your
comments about how you are using CERT Secure Coding Standards. 



Language
Language Standards Updates
  
CERT C Secure Coding Standard 
Editors: Martin Sebor (Cisco Systems), Aaron Ballman (SEI) 

Changed
   
CERT C++ Secure Coding Standard
Editors: Martin Sebor (Cisco Systems), Aaron Ballman (SEI) 

Changed  


DCL33-CPP. Never qualify a variable of reference type with const or volatile
Corrected examples and updated text about Visual Studio diagnostics were added.

CERT Oracle Secure Coding Standard for Java
Editors: Adam O'Brien (Oracle), David Svoboda (SEI)

Added 

Changed

Deprecation Candidates 

CERT Secure Coding Standard for Android  
CERT Perl Secure Coding Standard
Editor: David Svoboda (SEI) 

No Perl rules were added, removed, deprecated, or substantively changed in May and June.

Upcoming 
Upcoming Events and Training 

 

Course:

Secure Coding in C and C++, August 19-22, 2014 (SEI, Pittsburgh, PA) 

 

Secure Coding in C and C++ provides practical advice on secure practices in C and C++ programming. Producing secure programs requires secure designs. However, even the best designs can lead to insecure programs if developers are unaware of the many security pitfalls inherent in C and C++ programming. This course provides a detailed explanation of common programming errors in C and C++ and describes how these errors can lead to code that is vulnerable to exploitation.

Conference:
48th Annual Hawaii International Conference on System Sciences



January 5-8, 2015 Grand Hyatt Kauai, Hawaii

Conference:
TSP Symposium - See the Lineup of Speakers



The Team Software Process (TSP) Symposium 2014 technical program will go beyond the core methodology of TSP to encompass a broader range of complementary practices that contribute to peak performance on system and software projects.

The unifying theme of the conference is quality. Ultimately, a quality product and service must be delivered on time and within budget, be secure, be sustainable, and provide value to end users.

OurPeople
Our People   
In the eNewsletter, we highlight staff members behind our secure coding research. This month we feature Robert Seacord.

Robert C. Seacord is the Secure Coding Technical Manager. He is the author of The CERT C Secure Coding Standard (Addison-Wesley, 2014) and Secure Coding in C and C++ (Addison-Wesley, 2002) as well as co-author of two other books. Robert is also an adjunct professor at Carnegie Mellon University and a technical expert for ISO/IEC JTC1/SC22/WG14, the international standardization working group for the programming language C. 

 
Join the SEI CERT Secure Coding Community