O'Reilly logo

Handbook on Securing Cyber-Physical Critical Infrastructure by Nan Zhang, Krishna Kant, Sajal K Das

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13

Languages and Security: Safer Software Through Language and Compiler Techniques

Rahul Simha and Scotty Smith

13.1 Introduction

Developing secure software is a daunting task. Many tools and techniques have been created to alleviate the pressure of writing secure and efficient code. Some techniques were initially developed in the 1960s, whereas others are more recent developments. In the following chapter, we will be discussing defenses for different attacks on code and software systems. The defenses in this chapter will fall within the framework seen in Figure 13-1.

image

Figure 13-1 Software development cycle.

We discuss Watermarking in ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required