Open Access iconOpen Access

REVIEW

crossmark

Static Analysis Techniques for Secure Software: A Systematic Review

Brian Mweu1,*, John Ndia2

1 Department of Computer Science, Murang’a University of Technology, Murang’a, 75-10200, Kenya
2 Department of Information Technology, Murang’a University of Technology, Murang’a, 75-10200, Kenya

* Corresponding Author: Brian Mweu. Email: email

Journal of Cyber Security 2025, 7, 417-437. https://doi.org/10.32604/jcs.2025.071765

Abstract

Static analysis methods are crucial in developing secure software, as they allow for the early identification of vulnerabilities before the software is executed. This systematic review follows Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) 2020 guidelines to assess static analysis techniques for software security enhancement. We systematically searched IEEE Xplore, Association for Computing Machinery (ACM) Digital Library, SpringerLink, and ScienceDirect for journal articles published between 2017 and 2025. The review examines hybrid analyses and machine learning integration to enhance vulnerability detection accuracy. Static analysis tools enable early fault detection but face persistent challenges. These include high false-positive rates, scalability issues, and usability concerns. Our findings provide guidance for future research and methodological advancements to create better tools for secure software development.

Keywords

Static analysis; vulnerability detection; secure software development; false positives; machine learning; hybrid analysis; software security

Cite This Article

APA Style
Mweu, B., Ndia, J. (2025). Static Analysis Techniques for Secure Software: A Systematic Review. Journal of Cyber Security, 7(1), 417–437. https://doi.org/10.32604/jcs.2025.071765
Vancouver Style
Mweu B, Ndia J. Static Analysis Techniques for Secure Software: A Systematic Review. J Cyber Secur. 2025;7(1):417–437. https://doi.org/10.32604/jcs.2025.071765
IEEE Style
B. Mweu and J. Ndia, “Static Analysis Techniques for Secure Software: A Systematic Review,” J. Cyber Secur., vol. 7, no. 1, pp. 417–437, 2025. https://doi.org/10.32604/jcs.2025.071765



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 945

    View

  • 723

    Download

  • 0

    Like

Share Link