The majority of software that runs on embedded devices is now developed by external sources, not in-house development teams and source code is often unavailable. Without access to the source code, commercially available static source code analysis tools cannot fully account for the security consequences of executing the third-party code in an application. GrammaTech has developed an advanced new capability that uses binary analysis to examine third-party code without requiring access to source code. Extending security efforts into third-party code can accelerate development cycles, improve the security of software, and ultimately increase customer satisfaction. Adding binary analysis to the development process helps organizations deliver more trusted applications to customers and eliminate potential liabilities due to vulnerable third-party code.
- Dev Tools & OS
- Machine Learning
- Reference Designs
- Dev Kit Selector
- White Papers
- Webcasts & Events
- Product Search
- Parts Search
Dig deep into safety-critical code testing with coverage analysis
For safety-critical code, functional testing that ensures that the application does what it is supposed to ...
Subscribed! Look for 1st copy soon.
Error - something went wrong!
We also recommend:
MVTec brings deep learning to NVIDIA Pascal architecture
The deep learning inference in the new version 17.12 of the HALCON machine vision software was tested on NVIDIA Jetson TX2 boards based on 64-bit Arm processors.
Inflection point for RISC-V: The 7th RISC-V workshop in Silicon Valley
The lead announcement for the workshop was from Western Digital: they are starting to transition all their processors, currently around 1 billion shipped per year, to RISC-V.
2018 is the year of the user
We don't read manuals anymore. The products need to learn how to use the user, not the other way around.
Tool suite hastens medical-device development
LDRA tools help developers comply with IEC 62304
Adacore discusses "Make with Ada" challenge and new product announcement at #ARM TechCon 2017
Jamie Ayre with Adacore talks to Rich Nass with Embedded Computing Design about the ``Make with Ada'' challenge that occurred earlier this year. The contest aimed to help the embedded software communi
IAR Systems discussing safety and security at #ARM TechCon 2017
SANTA CLARA, CA -- Stefan Skarin, CEO at IAR Systems, talked to Rich Nass with Embedded Computing Design at ARM TechCon 2017 about safety and security. Stefan discusses code quality, security for deve
Upgraded ODBC Drivers with a Number of New Features
Devart released the updated versions of ODBC drivers with a number of new useful features
Virtual environments signal the end of the ICE era
Different types of verification IP target different methodologies of in-circuit emulation (ICE), and virtual and simulation acceleration.
Managing Internet connections on Linux devices with ConnMan
Connection Manager (ConnMan) is a connection management daemon (connmand) for managing Internet connections within devices running the Linux operating system.
LDRA Streamlines Automation for Software Safety and Security Compliance Management
LDRA tool suite's New Unprecedented Automation Unifies Compliance with Traceability and Test Management to Save Time and Cost
Simulation: Is it better than the real thing?
If a hardware design flaw is located late in the development process, it may be too late to fix it economically, so the only option is to accommodate the problem in software.
Want USB-C? Do it right!
USB-C is capable of delivering all USB performance levels – from 12 Mbps with USB 1.0 up to 10 Gbps with USB 3.1 Gen 2 – via a new symmetrical connector that is reversible.
BlueScope Chooses McObject's eXtremeDB Database Management System for its Plate Mill Control System
BlueScope turns to McObject's ultra-fast eXtremeDB database management system to upgrade its Plate Mill Information and Control System (PMICS) for teams across the Plate Mill facility at Port...
Three things that make you a superstar developer
Many people don’t know why they aren’t getting results at work. More often than not, it’s because they lack of the right kind of training. But what areas should you put your focus into?
The many uses of RTOS message queues
An application can have any number of message queues, each one having its own purpose.
Interfacing IoT with embedded using Node.js, part 5: Web interface
We've implemented a web server in Node.js that provides APIs for controlling GPIOs, sampling accelerometers, and reading ADC values. Now we tie it together with a web page that uses these services.
Digitizing inventory management
RTOS debugging, part 3: Chasing the jitter bug
The visible symptoms of jitter can be very similar to what you see in a system that suffers from CPU starvation, from general sluggishness to intermittent data loss or even malfunction.
Interfacing IoT with embedded using Node.js, part 3: Accelerometer
Cross-industry semantic interoperability, part five: Towards a common data format and API