0% found this document useful (0 votes)
4 views18 pages

Mini Project Mid Presentation

Uploaded by

rsanjithrajias
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views18 pages

Mini Project Mid Presentation

Uploaded by

rsanjithrajias
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

MINI PROJECT

Meghana D Duttargi
Name Sanjith R
Prajwal K V

Registration Numbers 241059042 241059044 241059047

Branch ME in Cyber Security

Project Title Secure Code Chatbot For C

Mrs. Keerthana B K
Guide Mr. Satyanarayan Shenoy
Mr. Ankith

17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project
Page 11
CONTENTS

1. Introduction
2. Objective
3. Literature Review
4. Operational Flow
5. Functional Requirements
6. Work Done
7. Results
8. Future Implementation
9. References

17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project
Page 22
INTRODUCTION

 C offers speed and versatility, but without careful coding, it opens doors to vulnerabilities
like buffer overflows and memory mismanagement.
 Buffer overflows and pointer errors can lead to major security breaches, making secure
coding essential in C development.
 A smart tool that helps developers detect vulnerabilities and apply best practices, ensuring
safer, more secure C code with real-time feedback.

17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project
Page 33
OBJECTIVE

 Implement static analysis techniques (data flow, control flow) for vulnerability detection.
 Incorporate tools such as GCC, Clang, Flawfinder, Splint.
 Address challenges like false positives and scalability.
 Develop an interactive chatbot to help developers detect security vulnerabilities in C
code.
 Provide secure coding best practices and explore machine learning-based enhancements

17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project
Page 44
LITERATURE REVIEW
No Name of the paper Tools Used Method Parameters

1 A Comparative Study of Static Code Flawfinder , RATS Static Code Analysis , Categories (CWE
Analysis tools for Vulnerability CPPCheck , CPPCheck , Juliet Test Suite , Categories) ,
Detection in C/C++ and JAVA Source PMD APACHE Tomcat Ratio (Detection
Cod Ratio) ,
Accuracy
(False Positives)

2 A Comparison of Static Analysis Tools


Static Code Analysis - Static Code Analysis , Categories –
Juliet Test Suite Apache Juliet Test Suite , Juliet CWE vulnerability
for Vulnerability Tomcat - Test Suite types.
Ratio - Vulnerability
Detection in C/C++ Code
detection rate.
Accuracy - Measures
false positives.

17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project
Page 55
No Name of the paper Tools Used Method Parameters

3 Beg Bunch – Benchmarking for C BegBunch Parfait, Accuracy Suite, Precision: True
Bug Detection Tools Splint, Clang Static Scalability Suite positives
Analyzer, UNO Recall: True positives
Accuracy:-measure
balancing Scalability:
Build and analysis time
across codebases.

4 An Empirical Evaluation of GitHub GitHub Copilot, Correctness Testing, Correctness: Test case
Copilot’s Code Suggestions LeetCode , Understandability pass rate on LeetCode.
SonarQube Assessment Understandability:
Measured by cognitive
and cyclomatic
complexity (via
SonarQube).
4o

17/01/202 MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project 6


OPERATIONAL FLOW

Start

Greet User

User Uploads C Code

Secure Chat Bot Workflow


Analysis of Code(Cppcheck)

Identify Vulnerabilities

Provide Feedback and suggestion

End

17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project
Page 77
FUNCTIONAL REQUIREMENTS

 Software Requirements
 Programming Language : Python
 Operating System : Windows 7 and above
 IDE : PyCharm
 Libraries and Frameworks: tkinter (for GUI),,Cppcheck

 Hardware Requirements
 Processor : Core i3 and later versions
 RAM : 4GB and above
 Hard Disk : 500GB

17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project
Page 88
IMPLEMENTATION

 Front-End:
 Tkinter GUI: Allows easy C code upload.
 Interactive Console: Greets users and performs code analysis.
 Error Highlighting: Displays results and highlights errors in the code.

 Back-End:
 Cppcheck Integration: Analyzes the code for issues.
 Vulnerability Detection: Identifies buffer overflows and other
vulnerabilities.

17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project
Page 99
WORK DONE

 GUI: Built a Tkinter interface for chatbot interaction and C code analysis.
 File Upload: Added file selection and validation for C files.
 Vulnerability Detection: Used regex to identify common security flaws (e.g., unsafe
functions, buffer overflows).
 Code Display: Highlighted vulnerabilities in uploaded code with detailed analysis.
 Chatbot Interaction: Guided users through file upload and analysis with timed messages.
 User Flow: Enabled starting new conversations and re-analyzing code.

17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project 10
Page 10
RESULTS

Fig 7.1 -

17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project 11
Page 11
RESULTS

Fig 7.2 -

17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project 12
Page 12
RESULTS

Fig 7.3 -

17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project 13
Page 13
RESULTS

Fig 7.4 -

17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project 14
Page 14
WORK DONE

 GUI: Built a Tkinter interface for chatbot interaction and C code analysis.
 File Upload: Added file selection and validation for C files.
 Vulnerability Detection: Used regex to identify common security flaws (e.g., unsafe
functions, buffer overflows).
 Code Display: Highlighted vulnerabilities in uploaded code with detailed analysis.
 Chatbot Interaction: Guided users through file upload and analysis with timed messages.
 User Flow: Enabled starting new conversations and re-analyzing code.

17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project 15
Page 15
WORK DONE

 GUI: Built a Tkinter interface for chatbot interaction and C code analysis.
 File Upload: Added file selection and validation for C files.
 Vulnerability Detection: Used regex to identify common security flaws (e.g., unsafe
functions, buffer overflows).
 Code Display: Highlighted vulnerabilities in uploaded code with detailed analysis.
 Chatbot Interaction: Guided users through file upload and analysis with timed messages.
 User Flow: Enabled starting new conversations and re-analyzing code.

17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project 16
Page 16
REFERENCES

1. A Comparison of Static Analysis Tools for Vulnerability Detection in C/C++ Code


(Andrei Arusoaie et al.)
2. An Empirical Evaluation of GitHub Copilot’s Code Suggestion (Nhan Nguyen &
Sarah Nadi ,2022)
3. A Comparative Study of Static Code Analysis tools for Vulnerability Detection in
C/C++ and JAVA Source Code ( Arvinder Kaura & Ruchikaa Nayyar)
4. BegBunch – Benchmarking for C Bug Detection Tools (Cristina Cifuentes, Christian
Hoermann et al.)
5. A Comparative Study of Static Analysis Tools for Vulnerability Detection in C Code"
by S. K. Goyal et al. (2019)
6. Program Dependence Learning (Aashish Yadavally and Tien N. Nguyen

17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project 17
Page 17
THANK YOU

17/01/202
29-09- MANIPAL SCHOOL OF INFORMATION SCIENCES, MAHE - Project 18
Page 18

You might also like