...
- It can be proved that the code is free from other errors that can expose the sensitive data.
- Attackers lack physical access to the target machine.
Related Guidelines
MITRE CWE | CWE ID 215, Information exposure through debug information CWE ID 226, Sensitive information uncleared before release CWE ID 524, Information exposure through caching CWE ID 526, Information exposure through environmental variables CWE ID 528, Exposure of core dump file to an unauthorized control sphere CWE ID 534, Information exposure through debug log files |
Bibliography
[API 2011] | Class ByteBuffer |
[Oracle 2012b] | Reading ASCII Passwords from an InputStream Example (Java Cryptography Architecture (JCA) Reference Guide) |
[Tutorials 2008] | I/O from the Command Line |
...