 
                            ...
- Calling the instance method of a nullobject.
- Accessing or modifying the field of a nullobject.
- Taking the length of nullas if it were an array.
- Accessing or modifying the elements of nullas if it were an array.
- Throwing nullas if it were aThrowablevalue.
Using a null in cases where an object is required results in a NullPointerException being thrown, which interrupts execution of the program or thread. Code conforming to this coding standard will consequently terminate , because because ERR08-J. Do not catch NullPointerException or any of its ancestors requires that NullPointerException is not caught. 
...
| Code Block | ||
|---|---|---|
| 
 | ||
| public static int cardinality(Object obj, final Collection<?> col) {
  int count = 0;
  if (col == null) {
    return count;
  }
  Iterator<?> it = col.iterator();
  while (it.hasNext()) {
    Object elt = it.next();
    if ((null == obj && null == elt) || obj.equals(elt)) {  // nullNull pointer dereference
      count++;
    }
  }
  return count;
}
 | 
...
This compliant solution eliminates the null pointer dereference by adding an explicit check.:
| Code Block | ||
|---|---|---|
| 
 | ||
| public static int cardinality(Object obj, final Collection col) {
  int count = 0;
  if (col == null) {
    return count;
  }
  Iterator it = col.iterator();
  while (it.hasNext()) {
    Object elt = it.next();
    if ((null == obj && null == elt) ||
        (null != obj && obj.equals(elt))) {
      count++;
    }
  }
  return count;
}
 | 
...
This noncompliant code example defines an isProperName() method that returns true if the specified String argument is a valid name (two capitalized words separated by one or more spaces).:
| Code Block | ||
|---|---|---|
| 
 | ||
| public boolean isProperName(String s) {
  String names[] = s.split(" ");
  if (names.length != 2) {
    return false;
  }
  return (isCapitalized(names[0]) && isCapitalized(names[1]));
}
 | 
...
The calling method, testString(), guarantees that isProperName() is always called with a valid string reference.  As a result, the class conforms with this rule , even though a public isProperName() method would not. Guarantees of this sort can be used to eliminate null pointer dereferences.
...
This compliant solution uses an Optional String instead of a String object that may be null. The Optional class ([API 2014] java.util.Optional [API 2014]) was introduced in Java 8 and can be used to mitigate against null pointer dereferences.
...
The Optional class contains methods that can be used to make programs shorter and more intuitive [Urma 2014].
Exceptions
EXP01-EX0: A method may dereference an object-typed parameter without guarantee that it is a valid object reference provided that the method documents that it (potentially) throws a NullPointerException, either via the throws clause of the method or in the method comments. However, this exception should be relied upon on sparingly.
Risk Assessment
Dereferencing a null pointer can lead to a denial of service. In multithreaded programs, null pointer dereferences can violate cache coherency policies and can cause resource leaks.
| Rule | Severity | Likelihood | Remediation Cost | Priority | Level | 
|---|---|---|---|---|---|
| EXP01-J | Low | Likely | High | P3 | L3 | 
Automated Detection
Null pointer dereferences can happen in path-dependent ways. Limitations of automatic detection tools can require manual inspection of code [Hovemeyer 2007] to detect instances of null pointer dereferences. Annotations for method parameters that must be non-null can reduce the need for manual inspection by assisting automated null pointer dereference detection; use of these annotations is strongly encouraged.
| Tool | Version | Checker | Description | ||||||
|---|---|---|---|---|---|---|---|---|---|
| Coverity | v7.5 
 | FORWARD_NULL | Implemented | ||||||
| Fortify | 
 | Missing_Check_against_Null | Implemented | ||||||
| Findbugs | 
 | NP_DEREFERENCE_OF_READLINE_VALUE | Implemented | 
Related Vulnerabilities
Java Web Start applications and applets particular to JDK version 1.6, prior to update 4, were affected by a bug that had some noteworthy security consequences. In some isolated cases, the application or applet's attempt to establish an HTTPS connection with a server generated a NullPointerException [SDN 2008]. The resulting failure to establish a secure HTTPS connection with the server caused a denial of service. Clients were temporarily forced to use an insecure HTTP channel for data exchange.
...
| Null Pointer Dereference [XYH] | |
Android Implementation Details
Android applications are more sensitive to NullPointerException due to because of the constraint of the limited mobile device memory. Static members or members of an Activity may become null when memory runs out.
...
| [API 2006] | |||
| [API 2014] | Class java.util.Optional | ||
| 
 | |||
| "Defect ID 00-0001" | 
 | "Null Pointer Dereference" | |
| [SDN 2008] | |||
| [Seacord 2015] | EXP01-J. Never dereference null pointers LiveLesson | Bug ID 6514454[SDN 2008] | |
| [Urma 2014] | Tired of Null Pointer Exceptions? Consider Using Java SE 8's Optional! | 
...