Q

Finding backdoor threats within applications

How can you find backdoor threats in your application? Use static binary analysis, says expert Chris Wysopal.

What is the best approach to uncover hidden backdoor threats within applications?
Backdoor threats are a method of bypassing authentication or other security controls in order to access a computer system or the data contained on that system. In fact, backdoors could ultimately lead to cyberfraud. I believe that static binary analysis is the best way to find malicious code such as backdoors, as well as root kits. That's because hackers can change binaries after they are compiled, and it is impossible to uncover this with source code tools.
This was first published in October 2007

Dig deeper on Software Security Test Best Practices

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchSOA

TheServerSide

SearchCloudApplications

SearchAWS

SearchBusinessAnalytics

SearchFinancialApplications

SearchHealthIT

Close