---
-title: Introduction
+title: Secure development
---
-# Part 9 - Secure development
-
In order to save a lot of time in code auditing, developers must follow coding
guidelines.
- [Kernel Drivers test](https://github.com/ucsb-seclab/dr_checker) with
[docs](https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-machiry.pdf).
-<!-- section-todo -->
-
Domain | Improvement
----------------------- | ------------
SecureDev-SecureBuild-1 | Add content.
-<!-- end-section-todo -->
-
## App/Widget signatures
-<!-- section-todo -->
-
Domain | Improvement
---------------------- | ------------
SecureDev-Signatures-1 | Add content.
-<!-- end-section-todo -->
-
## Code audit
These tools are used to check the correct implementation of functionalities and
- [Continuous Code Quality](https://www.sonarqube.org/).
-<!-- section-todo -->
-
Domain | Improvement
--------------------- | -----------------------------------------------------
SecureDev-CodeAudit-1 | Add CVE analyser.
SecureDev-CodeAudit-2 | [OSSTMM](http://www.isecom.org/mirror/OSSTMM.3.pdf).
-<!-- end-section-todo -->
-
### SATS
- [RATS](https://github.com/andrew-d/rough-auditing-tool-for-security) (Maybe to
### DATS
- [wiki
- list](https://en.wikipedia.org/wiki/Dynamic_program_analysis#Example_tools).
+ list](https://en.wikipedia.org/wiki/Dynamic_program_analysis#Example_tools).
\ No newline at end of file