"Program Verification Systems" (Co.Ltd) has announced the release of the new major version of PVS-Studio 5.0. The utility performs static analysis of a source code to reveal coding errors, programmer´s mistakes, fragments of code that can potentially produce a bug or disrupt the logic of the program. The new version is announced to support C++Builder, Windows Phone 8 and Windows Store projects.
Read more: http://sdt.bz/37360#ixzz2JZowL8RN
Follow us: @sdtimes on Twitter | sdtimes on Facebook
C++ Command Line Interfaces
Standard C++-based implementation.
No external dependencies, not even on a runtime library.
Any fundamental or user-defined C++ type can be used as an option type.
Automatic printing of formatted program usage information.
Automatic documentation generation in the HTML and man page formats.
Ability to read arguments from the argv array, file, and custom sources.
Support for erasing parsed arguments from the argv array.
Support for custom option formats.
Multi-value option parsing into the std::vector, std::set, and std::map containers.
Support for option aliases.
This presentation looks at PVS-Studio static code analyzer. PVS-Studio is a tool for bug detection in the source code of programs, written in C, C++ and C#. It works in Windows and Linux environment. PVS-Studio performs static code analysis and generates a report that helps a programmer find and fix bugs also performs a wide range of code checks, it is also useful to search for misprints and Copy-Paste errors.
Program errors occurring while porting C++ code from 32-bit platforms on 64-bit ones are observed. Examples of the incorrect code and the ways to correct it are given. Methods and means of the code analysis which allow to diagnose the errors discussed, are listed.
There is no fragment in program code where you cannot make mistakes. You may actually make them in very simple fragments. While programmers have worked out the habit of testing algorithms, data exchange mechanisms and interfaces, it's much worse concerning security testing. It is often implemented on the leftover principle. A programmer is thinking: "I just write a couple of lines now, and everything will be ok. And I don't even need to test it. The code is too simple to make a mistake there!". That's not right. Since you're working on security and writing some code for this purpose, test it as carefully!