Security Threats and Mitigation Techniques in C-Based Applications with Emphasis on Medical Database Protection
Saved in:
| Title: | Security Threats and Mitigation Techniques in C-Based Applications with Emphasis on Medical Database Protection |
|---|---|
| Authors: | Fnu Abdullah |
| Publisher Information: | Zenodo, 2024. |
| Publication Year: | 2024 |
| Subject Terms: | SQL Injection, Secure Coding, C programming, MIMIC-III, Buffer Overflow, Database Security |
| Description: | In an era where digital systems are increasingly under threat from cyberattacks, the importance of secure software development has never been more critical. This paper explores the unique security challenges presented by the C programming language, widely recognized for its performance, flexibility, and low-level system access. Despite its strengths, C's lack of built-in memory safety features introduces vulnerabilities such as buffer overflows and SQL injections, particularly when used to develop applications that interface with sensitive databases. With a specific focus on medical databases like MIMIC-III, this study examines how poor memory management, input validation failures, and unguarded database queries can expose critical patient data to risk. The paper reviews current literature, highlights common attack vectors, and proposes practical strategies rooted in secure coding standards and encryption practices. Additionally, emerging solutions like AI-powered code analysis tools and formal coding guidelines are discussed to provide a comprehensive outlook on future-proofing C-based systems. This work aims to contribute to the broader effort of promoting secure programming methodologies that protect digital infrastructure and sensitive information in critical sectors. |
| Document Type: | Report |
| DOI: | 10.5281/zenodo.15468261 |
| DOI: | 10.5281/zenodo.15468260 |
| Rights: | CC BY |
| Accession Number: | edsair.doi.dedup.....7b44a74d7670feadc0192b66e26e06a1 |
| Database: | OpenAIRE |
| Abstract: | In an era where digital systems are increasingly under threat from cyberattacks, the importance of secure software development has never been more critical. This paper explores the unique security challenges presented by the C programming language, widely recognized for its performance, flexibility, and low-level system access. Despite its strengths, C's lack of built-in memory safety features introduces vulnerabilities such as buffer overflows and SQL injections, particularly when used to develop applications that interface with sensitive databases. With a specific focus on medical databases like MIMIC-III, this study examines how poor memory management, input validation failures, and unguarded database queries can expose critical patient data to risk. The paper reviews current literature, highlights common attack vectors, and proposes practical strategies rooted in secure coding standards and encryption practices. Additionally, emerging solutions like AI-powered code analysis tools and formal coding guidelines are discussed to provide a comprehensive outlook on future-proofing C-based systems. This work aims to contribute to the broader effort of promoting secure programming methodologies that protect digital infrastructure and sensitive information in critical sectors. |
|---|---|
| DOI: | 10.5281/zenodo.15468261 |
Nájsť tento článok vo Web of Science