Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Java Coding Guidelines: 75 Recommendations for Reliable and Secure Programs provides specific advice to Java programmers. The application of these Java coding guidelines will lead to better systems that are more robust and more resistant to attack. These guidelines cover a wide range of products coded in Java for devices such as PCs, game players, mobile phones, home appliances, and automotive electronics.

Developers in any programming language should follow a set of guidelines to control the structure of their programs over and above what is specified by the programming language definition, and this is no less the case in Java. 

Java programmers need more help than that provided by the Java Language Specification (JLS) [JLS 2013] to produce reliable and secure Java programs. Java contains language features and APIs that can easily be misused, and guidance is needed to avoid theses pitfalls.

For a program to be reliable, it must work in all situations and in the face of all possible input. Inevitably, any nontrivial program will encounter a completely unexpected input or situation, and errors will occur. When such errors occur, it is important that the impact is limited, which is best achieved by localizing the error and dealing with it as soon as possible. Programmers can benefit from the experience of others in anticipating unusual input or programming situations and adopting a defensive style of programming.

Some of these guidelines are stylistic, but they are nonetheless important for readability and maintainability of the code. For Java, Oracle provides a set of Code Conventions [Conventions 2009] to help programmers produce a consistent programming style, and these conventions are widely adopted by Java programmers.

The CERT® Oracle® Secure Coding Standard for Java  

Java™ Coding Guidelines provides 75 guidelines that help Java programmers develop systems that are reliable and secure. It is written by the authors of The CERT® Oracle® CERT® Oracle® Secure Coding Standard for Java [Long 2011]. That coding standard provides a set of rules for secure coding in the Java programming language. The goal of those rules is to eliminate insecure coding practices that can lead to exploitable vulnerabilities. The Secure Coding Standard establishes normative requirements for software systems. These software systems can then be evaluated for conformance to the coding standard, for example, by using the Source Code Analysis Laboratory (SCALEeSCALe) [Seacord 2013]. However, there are poor Java coding practices that, although they do despite not warrant warranting inclusion in a secure coding standard for Java, can lead to unreliable or insecure programs. This book  Java Coding Guidelines serves to document and warn against such coding practices.

Although not included in the The CERT® Oracle® The CERT® Oracle® Secure Coding Standard for Java, these guidelines should not be considered less important.   Guidelines must be excluded from a coding standard when it is not possible to form a normative requirement.   There There are many reasons why that a normative requirement cannot be formed.   Perhaps the most common is that the rule depends on programmer intent.   Such rules cannot be automatically enforced , unless it is possible for the programmer's intent to be specified, in which case, a rule could require consistency between the code and the specified intent.   Forming a normative requirement also requires that a violation of that requirement represent a defect in the code.   Guidelines have been excluded from the coding standard (but included in this book) in cases where compliance with the guideline is always a good idea, but violating the guideline does not always result in an error.   This distinction is made because a system  cannot cannot be cited for non-conformance nonconformance without a specific defect.   This requires that Consequently, coding rules must be very narrowly defined.   Frequently, coding Coding guidelines can often have a more far-reaching impact on security and reliability just because they can be more broadly defined.Java Coding Guidelines: 75 Recommendations for Reliable and Secure Programs describes provides specific advice to Java programmers. The application of these Java coding guidelines will lead to better systems that are more robust and more resistant to attack. These guidelines cover a wide range of products coded in Java for devices such as PCs, game players, mobile phones, home appliances, and automotive electronics.

Many of the guidelines refer to rules in The CERT® Oracle® CERT® Oracle® Secure Coding Standard for Java.   These references are of the form IDS01-J. Normalize strings before validating them, where the first three letters of the reference identify the appropriate chapter of the The CERT® Oracle® Secure Coding Standard for Java book. For example, IDS refers to Chapter 2, "Input Validation and Data Sanitization (IDS)."

The Secure Coding Standard for Java rules are also available in a wiki at The CERT Oracle Secure Coding Standard for Java where they may have been updated since the Secure Coding Standard for Java book was published.available on CERT's secure coding wiki at https://www.securecoding.cert.org/confluence/display/java/The+CERT+Oracle+Secure+Coding+Standard+for+Java, where they continue to evolve. The CERT® Oracle® Secure Coding Standard for Java provides the definition of the rules for conformance testing purposes, but the wiki may contain additional information or insights not included in the book that may help you interpret the meaning of these rules.

Cross references to other guidelines throughout this book are given simply References in a guideline to other guidelines are simply given by the number and title of the guideline.

Rec.: Scope

Rec.: Audience

Rules and Recommendations

Rec.: Contents and Organization

Rec.: Guidelines

Rec.: Usage

Rec.: System Qualities

Rec.: Priority and Levels

Rec.: Automatically Generated Code

Rec.: Source Code Validation

Rec.: Tool Selection and Validation

Acknowledgments

 

 

...

Image Added  Image Added  Image Added