Buy used:
$5.18
$19.98 delivery July 26 - August 16. Details
Used: Good | Details
Condition: Used: Good
Comment: Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc...
Access codes and supplements are not guaranteed with used items.
Only 1 left in stock - order soon.
Added to

Sorry, there was a problem.

There was an error retrieving your Wish Lists. Please try again.

Sorry, there was a problem.

List unavailable.
Other sellers on Amazon
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the author

Something went wrong. Please try your request again later.

Secure Coding in C And C++ 1st Edition

4.4 4.4 out of 5 stars 21 ratings

There is a newer edition of this item:

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append it as an afterthought. That's the point of Secure Coding in C and C++.In careful detail, this book shows software developers how to build high-quality systems that are less vulnerable to costly and even catastrophic attack. It's a book that every developer should read before the start of any serious project."
--Frank Abagnale, author, lecturer, and leading consultant on fraud prevention and secure documents

Learn the Root Causes of Software Vulnerabilities and How to Avoid Them

Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed nearly 18,000 vulnerability reports over the past ten years, the CERT/Coordination Center (CERT/CC) has determined that a relatively small number of root causes account for most of them. This book identifies and explains these causes and shows the steps that can be taken to prevent exploitation. Moreover, this book encourages programmers to adopt security best practices and develop a security mindset that can help protect software from tomorrow's attacks, not just today's.

Drawing on the CERT/CC's reports and conclusions, Robert Seacord systematically identifies the program errors most likely to lead to security breaches, shows how they can be exploited, reviews the potential consequences, and presents secure alternatives.

Coverage includes technical detail on how to

  • Improve the overall security of any C/C++ application
  • Thwart buffer overflows and stack-smashing attacks that exploit insecure string manipulation logic
  • Avoid vulnerabilities and security flaws resulting from the incorrect use of dynamic memory management functions
  • Eliminate integer-related problems: integer overflows, sign errors, and truncation errors
  • Correctly use formatted output functions without introducing format-string vulnerabilities
  • Avoid I/O vulnerabilities, including race conditions

Secure Coding in C and C++ presents hundreds of examples of secure code, insecure code, and exploits, implemented for Windows and Linux. If you're responsible for creating secure C or C++ software--or for keeping it safe--no other book offers you this much detailed, expert assistance.



Editorial Reviews

About the Author

Robert Seacord began programming (professionally) for IBM in 1982 and has been programming in C since 1985, and in C++ since 1992. Robert is currently a Senior Vulnerability Analyst with the CERT/Coordination Center at the Software Engineering Institute (SEI). He is coauthor of Building Systems from Commercial Components (Addison-Wesley, 2002) andModernizing Legacy Systems (Addison-Wesley, 2003). The CERT/CC, among other security-related activities, regularly analyzes software vulnerability reports and assesses the risk to the Internet and other critical infrastructure.



Excerpt. © Reprinted by permission. All rights reserved.

The CERT Coordination Center® (CERT/CC) was formed by the Defense Advanced Research Projects Agency (DARPA) in November 1988 in response to the Morris worm incident, which brought 10 percent of Internet systems to a halt in November 1988. The CERT/CC is located in Pittsburgh, Pennsylvania, at the Software Engineering Institute (SEI), a federally funded research and development center sponsored by the U.S. Department of Defense.

The initial focus of the CERT/CC was incident response and analysis. Incidents include successful attacks such as compromises and denial of service, as well as attack attempts, probes, and scans. Since 1988, the CERT/CC has received more than 22,665 hotline calls reporting computer security incidents or requesting information, and has handled more than 319,992 computer security incidents. The number of incidents reported each year continues to grow.

Responding to incidents, while necessary, is insufficient to secure the Internet and interconnected information systems. Analysis indicates that the majority of incidents are caused by trojans, social engineering, and the exploitation of software vulnerabilities, including software defects, design decisions, configuration decisions, and unexpected interactions between systems. The CERT/CC monitors public sources of vulnerability information and regularly receives reports of vulnerabilities. Since 1995, more than 16,726 vulnerabilities have been reported. When a report is received, the CERT/CC analyzes the potential vulnerability and works with technology producers to inform them of security deficiencies in their products and to facilitate and track their response to those problems.

Similar to incident reports, vulnerability reports continue to grow at an alarming rate. While managing vulnerabilities pushes the process upstream, it is again insufficient to address the issues of Internet and information system security. To address the growing number of both vulnerabilities and incidents, it is increasingly apparent that the problem must be attacked at the source by working to prevent the introduction of software vulnerabilities during software development and ongoing maintenance. Analysis of existing vulnerabilities indicates that a relatively small number of root causes account for the majority of vulnerabilities. The goal of this book is to educate developers about these root causes and the steps that can be taken so that vulnerabilities are not introduced.

Audience

Secure Coding in C and C++ should be useful to anyone involved in the development or maintenance of software in C and C++.

  • For a C/C++ programmer, this book will teach you how to identify common programming errors that result in software vulnerabilities, understand how these errors are exploited, and implement a solution in a secure fashion.
  • For a software project manager, this book identifies the risks and consequences of software vulnerabilities to guide investments in developing secure software.
  • For a computer science student, this book will teach you programming practices that will help you to avoid developing bad habits and enable you to develop secure programs during your professional career.
  • For a security analyst, this book provides a detailed description of common vulnerabilities, identifies ways to detect these vulnerabilities, and offers practical avoidance strategies.

Organization and Content

Secure Coding in C and C++ provides practical guidance on secure practices in C and C++ programming. Producing secure programs requires secure designs. However, even the best designs can lead to insecure programs if developers are unaware of the many security pitfalls inherent in C and C++ programming. This book provides a detailed explanation of common programming errors in C and C++ and describes how these errors can lead to code that is vulnerable to exploitation. The book concentrates on security issues intrinsic to the C and C++ programming languages and associated libraries. It does not emphasize security issues involving interactions with external systems such as databases and Web servers, as these are rich topics on their own. The intent is that this book be useful to anyone involved in developing secure C and C++ programs regardless of the specific application.

Secure Coding in C and C++ is organized around functional capabilities commonly implemented by software engineers that have potential security consequences, such as formatted output and arithmetic operations. Each chapter describes insecure programming practices and common errors that can lead to vulnerabilities, how these programming flaws can be exploited, the potential consequences of exploitation, and secure alternatives. Root causes of software vulnerabilities, such as buffer overflows, integer type range errors, and invalid format strings, are identified and explained where applicable. Strategies for securely implementing functional capabilities are described in each chapter, as well as techniques for discovering vulnerabilities in existing code.

This book contains the following chapters:

  • Chapter 1 provides an overview of the problem, introduces security terms and concepts, and provides insight as to why so many vulnerabilities are found in C and C++ programs.
  • Chapter 2 describes string manipulation in C and C++, common security flaws, and resulting vulnerabilities including buffer overflow and stack smashing. Both code and arc injection exploits are examined.
  • Chapter 3 introduces arbitrary memory write exploits that allows an attacker to write a single address to any location in memory. This chapter describes how these exploits can be used to execute arbitrary code on a compromised machine. Vulnerabilities resulting from arbitrary memory writes are discussed in later chapters.
  • Chapter 4 describes dynamic memory management. Dynamically allocated buffer overflows, writing to freed memory, and double-free vulnerabilities are described.
  • Chapter 5 covers integral security issues (security issues dealing with integers) including integer overflows, sign errors, and truncation errors.
  • Chapter 6 describes the correct and incorrect use of formatted output functions. Both format string and buffer overflow vulnerabilities resulting from the incorrect use of these functions are described.
  • Chapter 7 describes common vulnerabilities associated with file I/O including race conditions and time of creation, time of use (TOCTOU) vulnerabilities.
  • Chapter 8 recommends specific development practices for improving the overall security of your C / C++ application. These recommendations are in addition to the recommendations included in each chapter for addressing specific vulnerability classes.

Secure Coding in C and C++ contains hundreds of examples of secure and insecure code as well as sample exploits. Almost all of these examples are in C and C++, although comparisons are drawn with other languages. The examples are implemented for Windows and Linux operating systems. Unless otherwise stated, Microsoft Windows examples are compiled using Visual C++ .NET and tested on Windows 2000 Professional platform with an Intel Pentium 4 processor, while Linux examples are compiled with GNU gcc/g++ and tested running Red Hat Linux 9 on an Intel Pentium 4 processor.

While the specific examples typically have been compiled and tested in one or more of these environments, vulnerabilities are evaluated to determine whether they are specific to or generalizable across compiler version, operating system, microprocessor, applicable C or C++ standards, little or big endian architectures, and execution stack architecture.

This book focuses on programming flaws in C and C++ that are the most common causes of software vulnerability. However, because of size and space constraints, not every potential source of vulnerabilities is covered. Additional and updated information, events, and news related to Secure Coding in C and C++ is available at http://www.cert.org/books/secure-coding/. Vulnerabilities discussed in the book are also cross-referenced with real-world examples from the US-CERT Vulnerability Notes Database at http://www.kb.cert.org/vuls/.

Product details

  • Publisher ‏ : ‎ Addison-Wesley Professional; 1st edition (January 1, 2005)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 341 pages
  • ISBN-10 ‏ : ‎ 0321335724
  • ISBN-13 ‏ : ‎ 978-0321335722
  • Item Weight ‏ : ‎ 1.28 pounds
  • Dimensions ‏ : ‎ 6.75 x 0.75 x 9 inches
  • Customer Reviews:
    4.4 4.4 out of 5 stars 21 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
Robert C. Seacord
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Robert C. Seacord is a computer scientist, computer security specialist, and writer. He is the author of books on computer security, legacy system modernization, and component-based software engineering. He has a Bachelor in computer science from Rensselaer Polytechnic Institute.

Robert C. Seacord manages the Secure Coding Initiative at CERT, located in Carnegie Mellon’s Software Engineering Institute (SEI) in Pittsburgh, PA. CERT, among other security related activities, regularly analyzes software vulnerability reports and assesses the risk to the Internet and other critical infrastructure. Robert is an adjunct professor in the Carnegie Mellon University School of Computer Science and in the Information Networking Institute.

Robert started programming professionally for IBM in 1982, working in communications and operating system software, processor development, and software engineering. Robert also has worked at the X Consortium, where he developed and maintained code for the Common Desktop Environment and the X Window System.

Customer reviews

4.4 out of 5 stars
4.4 out of 5
21 global ratings

Top reviews from the United States

Reviewed in the United States on January 29, 2014
Cons
- this isn't the latest edition, so don't buy this one

Pros
- very easy to read
- relevant
3 people found this helpful
Report
Reviewed in the United States on June 26, 2013
This book has good knowledge one you get used to the writing style. The content is alright. But the editor has missed so many code bugs... I guess thats the code writers fault but still, its annoying. Good thing this is a higher level book or else beginners would have gotten frustrated. :P But yeah, this only gets three stars just for the fact that the content is just not incredible and the editing got to me.
One person found this helpful
Report
Reviewed in the United States on November 22, 2016
Detailed, precise.
Reviewed in the United States on December 21, 2011
This is one of the few books that every C and C++ programmer should read. It shows detailed examples of the very undesirable sorts of things that attackers can force badly written code into unwittingly doing; it also explains how to create multiple layers of defense around the bad code that inevitably finds its way into real programs. The book is well written; I will concentrate here on the relatively minor defects.

First: Many sections of the book are of necessity really, really boring. The chapter on integer security must set the record for most boring chapter ever written in a programming textbook. Fortunately, most of the boring parts can be skimmed over. For example, once you grok the basic idea of how an attacker can exploit a buffer overflow to overwrite the return address on the stack, you do not need to read the long discussion that shows in gory detail exactly how it is done.

Second: Although the authors are clearly very knowledgeable in their area, the book contains an occasional strangely worded phrase (and in one case a piece of code that does not do what they state it does) that leads me to suspect that the authors perhaps might not have *written* lots of code themselves.

Third: The discussion on the various tools and libraries that are available to mitigate security risks are useful, but strangely irrelevant. I have programmed on a lot of different projects in my life with a lot of different people, and I have met few, if any, people who actually use any of these tools and libraries. Further, the time that would be spent using the tools would in many cases be better spent by simply re-reading your code multiple times to find and remove the awful code that the tools are defending against and that no decent programmer should write in the first place.

That being said, the book is well written and essential reading for C and C++ programmers.
3 people found this helpful
Report
Reviewed in the United States on November 8, 2005
There seem to be three categories of computer security books. The first category is books written for system administrators or computer owners, and explains how to protect the computers under their control. The second category is the "true crime" genre that recounts the exploits of black hat hackers or explains the hacker culture (sometimes as "how-to" books for non-programmers). The third, and rarest, category is books for professional programmers that explain the coding idioms that make programs more secure or more insecure.

This book is an excellent contribution to the third category. It explains how certain ways of programming in C and C++ make programs vulnerable to security attacks. There are many code examples throughout the book illustrating the issues.

Although everything is explained in great detail, the treatment is not superficial. (No background in computer security is required, but the reader should be at least a journeyman C or C++ programmer.) Some of the security holes will surprise readers familiar with the basics of computer security. My favorite example: Many programmers know that the gets() function once was involved with compromising 10% of the computers on the Internet in a single day, but did you know that printf can also be a security flaw in some cases? The statement:
printf(s);
can allow an attacker to run any code of his choosing if s is a string provided by the attacker. Even more surprising is the printf attack has been used successfully on popular programs.

This book should be read by any programmer who does I/O across a network, or who writes applications that provide a captive environment for their users (data entry stations, information kiosks), or who writes programs to manipulate sensitive data. Even programmers merely curious about security issues will find this book a readable treatment. I guess the Black Hats can read the book to get more ideas for future attacks.

I can personally vouch for Seacord's expertise. He is a security analyst as the Computer Emergency Response Team/Coordination Center, and I've worked with him on the ANSI/ISO C Programming Language Standards Committee. I've found his information on computer security both educational and valuable.
[...]
26 people found this helpful
Report

Top reviews from other countries

Translate all reviews to English
Parvez Ahmad
4.0 out of 5 stars Four Stars
Reviewed in India on June 9, 2017
Excellent book!
ADEL
5.0 out of 5 stars valuable book
Reviewed in the United Kingdom on March 28, 2015
it did helped me to improve my programming skills and I am not a professional programmer.
Jean-marc Seillon
5.0 out of 5 stars Sécurité en bonnes pratiques
Reviewed in France on May 18, 2009
Un très bon outils pour faire du code robuste et comprendre d'où viennent les faiblesses des programmes codés à la va-vite par des amateurs.
Recommandé pour les pros qui s'intéressent à la qualité et la robustesse de leur code.
Slawek
3.0 out of 5 stars I would refer people to it as this one was still a good read.
Reviewed in the United Kingdom on July 5, 2017
One or two months after I bought it, there was the 2nd edition published. I would refer people to it as this one was still a good read.
Roax
4.0 out of 5 stars Helpful
Reviewed in Germany on March 3, 2006
The book aims to give an overview of programming errors that lead to possibly exploitable software defects. Some of these are errors you'd think only an amateur wouldn't avoid, others exploits are only possible due to complex combinations of compiler- or platform-specific behaviour and seemingly minor oversights. Each of the chapters is written by a different author, so they vary in quality and sometimes, as a programmer, you might be tempted to skip passages, because you just don't use the techniques described (good for you). But if you've got to review or refactor code you might come upon these techniques sooner or later, so it might be good to know about them anyway.
Examples and code fragments are understandable; as some of the techniques used in exploiting software defects are quite advanced magic it may sometimes necessary to reread sections.
3 people found this helpful
Report