Securing Development with PMD

简介: Back in April I presented my Securing Development with PMD (Teaching an Old Dog New Tricks) presentation at OWASP AppSec DC.
Back in April I presented my Securing Development with PMD (Teaching an Old Dog New Tricks) presentation at OWASP AppSec DC. The main idea was to demonstrate how security can be integrated into development without introducing new tools to existing developer toolsets. As an example, I discussed how PMD, a well-known open source static analysis tool that finds code quality issues in Java source code, can be extended with custom rules to find common application security bugs. With minimal change to existing PMD deployments and without having to learn to use another new tool, Java developers can identify and remediate both code quality and security bugs together. You can download my presentation here and the latest version of the GDS Secure Coding Ruleset for PMD can be found on our GitHub web page here. I encourage developers as well as pen-testers to use and improve the ruleset. Enjoy!
目录
相关文章
|
Java API Spring
读书笔记系列 - Operating Systems: Three Easy Pieces - Virtualization - Chapter 4: Processes
读书笔记系列 - Operating Systems: Three Easy Pieces - Virtualization - Chapter 4: Processes
122 0
读书笔记系列 - Operating Systems: Three Easy Pieces - Virtualization - Chapter 4: Processes
|
Devops 容器
Why SSDs Matter for Application Development
Solid state disks (SSDs) have become popular in today's servers and consumer devices as a means of improving data I/O and application performance
1223 0
Why SSDs Matter for Application Development
|
前端开发 Unix Shell
QA Best Practices in Rapid Iterative Development
Introduction and Background Although rapid iterative development has become a popular approach to software development, many development teams are u.
1702 0
|
安全 物联网
Security loopholes that businesses need to plug right now
The number of cybersecurity breaches for enterprises continues to spike, leaving even the world's largest companies vulnerable to attacks.
1642 0
|
安全 关系型数据库 Unix
How To Defeat Advanced Malware. New Tools for Protection and Forensics
http://www.concise-courses.com/learn/about-endpoint-protection/ ...
676 0