The majority of software that runs on embedded devices is now developed by external sources, not in-house development teams and source code is often unavailable. Without access to the source code, commercially available static source code analysis tools cannot fully account for the security consequences of executing the third-party code in an application. GrammaTech has developed an advanced new capability that uses binary analysis to examine third-party code without requiring access to source code. Extending security efforts into third-party code can accelerate development cycles, improve the security of software, and ultimately increase customer satisfaction. Adding binary analysis to the development process helps organizations deliver more trusted applications to customers and eliminate potential liabilities due to vulnerable third-party code.
- Dev Tools & OS
- Machine Learning
- Reference Designs
- System Block Diagrams
- Dev Kit Selector
- White Papers
- Webcasts & Events
- Product Search
- Embedded World
Dig deep into safety-critical code testing with coverage analysis
For safety-critical code, functional testing that ensures that the application does what it is supposed to ...
Subscribed! Look for 1st copy soon.
Error - something went wrong!
We also recommend:
IAR Systems leads the way for secure IoT development based on Arm TrustZone and Arm Cortex-M
The leading independent Arm tools provider enables companies to go to market early with robust, secure IoT products
Connect to an Embedded Web Server with Automated Certificate Management
Don't let your users get caught in a security web. Make it easy for them.
Strategies for Deploying Xilinx's Zynq UltraScale+ RFSoC
On February 21st, 2017, Xilinx® announced the introduction of a new technology called RFSoC with the rather dramatic headline “Xilinx Unveils Disruptive Integration and Architectural Breakthrough for
Neural Network Optimization with Sparse Computing and Facebook Glow
There are 27 different types of neural networks. The number of neural network types has increased as engineers and data scientists seek out optimized implementations of AI for use cases.
Riding the Deep Learning Wave: Simulations Enabling Software Engineers to Generate Data Needed to Train Neural Networks
The vision of software solutions evolving from exposure to data has some compelling aspects: training by example offers the possibility of a true mass manufacturing technique for software.
Significance of Certified Ethical Hacker (CEH) Training and Certification
In order to save your company from online hackers, the significance of becoming a Certified Ethical Hacker (CEH) is gaining momentum around the world.
Trends in Embedded: Microchip
Microchip is certainly one of the leaders in the embedded industry. The number of MCUs the company manufactures is staggering by just about any metric.
Software Development Life Cycle Stages When Getting Started on a New Idea
When you work in the software industry, you're likely aware of how open, flexible and innovative the market is.
Simple On-Line Training For Complex Topics
The basics of deep learning and neural nets, as well as Ada and Spark are handled in a refreshing manner.
STMicroelectronics acquires graphical user interface software specialist Draupner Graphics
-Acquisition to extend STM32 ecosystem with TouchGFX highly advanced GUI solution for embedded applications -Will accelerate TouchGFX roadmap and scale distribution to the mass market -TouchGFX...
Embedded tools and services provider Ashling wins approval as NXP engineering consultant
Thanks to 20+ years of partnership with NXP on embedded tools and services activities, Ashling has been approved by NXP as an Advanced Engineering Consultant
Security must remain effective throughout a product’s entire lifetime
The Timesys TRST technology reduces the attack surface of an embedded system.
Free or not free; that is the question
There really are no free development tools. Here’s what you need to consider when choosing development tools for your next project.
AdaCore Technologies for cyber security, part 2: The challenge of secure software
This article considers why building and operating secure computer systems appears to be so difficult, as evidenced by the frequency and magnitude of attacks reported in the media.
Automotive multicore gets a model-based development boost
The performance and capabilities of multicore automotive control MCUs enable automakers to add new features. However, these devices also require more advanced parallel programming techniques.
FPGAs for embedded AI: Reducing power consumption, programming complexity for mass markets
Developers are investigating AI in embedded applications for automotive, industrial, and consumer markets. Many of these have strict thresholds in terms of the power consumption and complexity.
Challenges Faced by Embedded Developers
We’re on-site at the IAR DevCon in Dallas, helping embedded developers solve their biggest challenges. What are those challenges you? That’s the question I asked oh Tod Chapman, one of IAR technical e
Implementing Secured Software Updates for IoT Devices
This paper provides a comprehensive summary of theoretical approaches and recipes for practical implementation. It also shows that hardware-based security can make it easier to design secured software
IAR Systems updates design and code generation tool for event-driven embedded systems
Version 9.1 of IAR Visual State speeds up time to market and increases team efficiency.
Using a memory protection unit with an RTOS, part 4