Mini Project Mid Presentation
Mini Project Mid Presentation
Meghana D Duttargi
Name Sanjith R
Prajwal K V
Mrs. Keerthana B K
Guide Mr. Satyanarayan Shenoy
Mr. Ankith
17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project
Page 11
CONTENTS
1. Introduction
2. Objective
3. Literature Review
4. Operational Flow
5. Functional Requirements
6. Work Done
7. Results
8. Future Implementation
9. References
17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project
Page 22
INTRODUCTION
C offers speed and versatility, but without careful coding, it opens doors to vulnerabilities
like buffer overflows and memory mismanagement.
Buffer overflows and pointer errors can lead to major security breaches, making secure
coding essential in C development.
A smart tool that helps developers detect vulnerabilities and apply best practices, ensuring
safer, more secure C code with real-time feedback.
17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project
Page 33
OBJECTIVE
Implement static analysis techniques (data flow, control flow) for vulnerability detection.
Incorporate tools such as GCC, Clang, Flawfinder, Splint.
Address challenges like false positives and scalability.
Develop an interactive chatbot to help developers detect security vulnerabilities in C
code.
Provide secure coding best practices and explore machine learning-based enhancements
17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project
Page 44
LITERATURE REVIEW
No Name of the paper Tools Used Method Parameters
1 A Comparative Study of Static Code Flawfinder , RATS Static Code Analysis , Categories (CWE
Analysis tools for Vulnerability CPPCheck , CPPCheck , Juliet Test Suite , Categories) ,
Detection in C/C++ and JAVA Source PMD APACHE Tomcat Ratio (Detection
Cod Ratio) ,
Accuracy
(False Positives)
17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project
Page 55
No Name of the paper Tools Used Method Parameters
3 Beg Bunch – Benchmarking for C BegBunch Parfait, Accuracy Suite, Precision: True
Bug Detection Tools Splint, Clang Static Scalability Suite positives
Analyzer, UNO Recall: True positives
Accuracy:-measure
balancing Scalability:
Build and analysis time
across codebases.
4 An Empirical Evaluation of GitHub GitHub Copilot, Correctness Testing, Correctness: Test case
Copilot’s Code Suggestions LeetCode , Understandability pass rate on LeetCode.
SonarQube Assessment Understandability:
Measured by cognitive
and cyclomatic
complexity (via
SonarQube).
4o
Start
Greet User
Identify Vulnerabilities
End
17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project
Page 77
FUNCTIONAL REQUIREMENTS
Software Requirements
Programming Language : Python
Operating System : Windows 7 and above
IDE : PyCharm
Libraries and Frameworks: tkinter (for GUI),,Cppcheck
Hardware Requirements
Processor : Core i3 and later versions
RAM : 4GB and above
Hard Disk : 500GB
17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project
Page 88
IMPLEMENTATION
Front-End:
Tkinter GUI: Allows easy C code upload.
Interactive Console: Greets users and performs code analysis.
Error Highlighting: Displays results and highlights errors in the code.
Back-End:
Cppcheck Integration: Analyzes the code for issues.
Vulnerability Detection: Identifies buffer overflows and other
vulnerabilities.
17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project
Page 99
WORK DONE
GUI: Built a Tkinter interface for chatbot interaction and C code analysis.
File Upload: Added file selection and validation for C files.
Vulnerability Detection: Used regex to identify common security flaws (e.g., unsafe
functions, buffer overflows).
Code Display: Highlighted vulnerabilities in uploaded code with detailed analysis.
Chatbot Interaction: Guided users through file upload and analysis with timed messages.
User Flow: Enabled starting new conversations and re-analyzing code.
17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project 10
Page 10
RESULTS
Fig 7.1 -
17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project 11
Page 11
RESULTS
Fig 7.2 -
17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project 12
Page 12
RESULTS
Fig 7.3 -
17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project 13
Page 13
RESULTS
Fig 7.4 -
17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project 14
Page 14
WORK DONE
GUI: Built a Tkinter interface for chatbot interaction and C code analysis.
File Upload: Added file selection and validation for C files.
Vulnerability Detection: Used regex to identify common security flaws (e.g., unsafe
functions, buffer overflows).
Code Display: Highlighted vulnerabilities in uploaded code with detailed analysis.
Chatbot Interaction: Guided users through file upload and analysis with timed messages.
User Flow: Enabled starting new conversations and re-analyzing code.
17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project 15
Page 15
WORK DONE
GUI: Built a Tkinter interface for chatbot interaction and C code analysis.
File Upload: Added file selection and validation for C files.
Vulnerability Detection: Used regex to identify common security flaws (e.g., unsafe
functions, buffer overflows).
Code Display: Highlighted vulnerabilities in uploaded code with detailed analysis.
Chatbot Interaction: Guided users through file upload and analysis with timed messages.
User Flow: Enabled starting new conversations and re-analyzing code.
17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project 16
Page 16
REFERENCES
17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project 17
Page 17
THANK YOU
17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project 18
Page 18