{"title":"Real-time privacy vulnerability detection techniques in software development: A Systematic Literature Review","authors":"Nadisha Madhushanie , Sugandima Vidanagamachchi , Nalin Arachchilage","doi":"10.1016/j.cose.2025.104659","DOIUrl":null,"url":null,"abstract":"<div><div>Real-time privacy vulnerability detection is one of the major concerns nowadays in developing secure software systems due to the growing complexity of software development and the increased attention to data privacy. This study conducts a Systematic Literature Review (SLR) to explore existing techniques, tools, and frameworks for detecting privacy vulnerabilities in real-time during the software development. We analyze relevant studies to identify key approaches, their effectiveness, and limitations by using the Kitchenham methodology and include it into the PRISMA framework. In addition, we categorize existing approaches into IDE integrated tools, network security solutions, mobile specific techniques, and general analysis tools. Summary tables further synthesize these techniques, tools, and their comparative attributes. Our findings reveal a variety of methods, including static and dynamic analysis, machine learning based detection, and integration of privacy-by-design. We also highlight challenges such as scalability, false positives, and the need for developer friendly tools. This review provides a comprehensive overview of the state-of-the-art in real-time privacy vulnerability detection approaches and offers insights into future research directions to enhance privacy protection in software development environments.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"159 ","pages":"Article 104659"},"PeriodicalIF":5.4000,"publicationDate":"2025-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825003487","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Real-time privacy vulnerability detection is one of the major concerns nowadays in developing secure software systems due to the growing complexity of software development and the increased attention to data privacy. This study conducts a Systematic Literature Review (SLR) to explore existing techniques, tools, and frameworks for detecting privacy vulnerabilities in real-time during the software development. We analyze relevant studies to identify key approaches, their effectiveness, and limitations by using the Kitchenham methodology and include it into the PRISMA framework. In addition, we categorize existing approaches into IDE integrated tools, network security solutions, mobile specific techniques, and general analysis tools. Summary tables further synthesize these techniques, tools, and their comparative attributes. Our findings reveal a variety of methods, including static and dynamic analysis, machine learning based detection, and integration of privacy-by-design. We also highlight challenges such as scalability, false positives, and the need for developer friendly tools. This review provides a comprehensive overview of the state-of-the-art in real-time privacy vulnerability detection approaches and offers insights into future research directions to enhance privacy protection in software development environments.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.