본문바로가기

Ascertaining vulnerabilities that might occur on the web application source using secure coding checking tools, providing a vulnerabilities-found route and a detection line and providing education and correction guides on items of vulnerabilities based on various security checking criteria including, but not limited to, vulnerabilities based on 47 secure codes of Ministry of Government Administration and Home Affairs and on OWASP TOP 10.

Service Procedures

  • Diagnostic items at design step

    20 items including, but not limited to, DBMS inquiry and result validation, memory approach within allowable scope, limit on certification performance and session control
    * Download from Ministry of Government Administration and Home Affairs of diagnostic items at design step

  • Diagnostic items at implementation step

    47 items including, but not limited to, SQL insertion, cross site script, system data information exposure and use of vulnerable API
    * Download from Ministry of Government Administration and Home Affairs of diagnostic items at design step

Benefits

Enhancement of program stability by detecting and removing security weakness inherent in source codes

Development of reliable software through reinforcement of security and stability of software

Major Customers