Veracode Now Scans for Software Backdoors
Veracode shines spotlight on software backdoors as an emerging threat
BURLINGTON, Mass. -- Veracode Inc., the leading provider of on-demand application security testing solutions, today announced comprehensive support for detecting backdoors and malicious code as part of Veracode’s SecurityReview® solution for developers and purchasers of software. Based on research conducted by the Veracode security team, Veracode has added new scanning capabilities as well as deeper support for detection of backdoors and malicious code using Veracode’s patented static binary analysis technology.
As the complexity of modern software applications increases, with components assembled from reusable binary components, backdoors can easily circumvent even the best of QA cycles, resulting in the need for a more complete and accurate approach to software security testing. Veracode’s binary software testing, which provides 100% coverage as opposed to the partial coverage of today’s source code-only analysis solutions, is uniquely positioned to tackle the backdoors and malicious code challenge by offering a complete, independent security verification of an entire software application.
To combat the risks backdoors pose to organizations, Veracode conducted extensive research and developed the first comprehensive taxonomy of backdoors so that organizations and application developers can better understand how to detect these hidden threats. In the course of the research, Veracode found that the average time to discovery of a backdoor inserted in open source software was measured in weeks. Backdoors in commercial “closed source” applications went undetected for years, putting company and individuals’ personal data at risk.
About the Author(s)
You May Also Like
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024