The majority of software that runs on embedded devices is now developed by external sources, not in-house development teams and source code is often unavailable. Without access to the source code, commercially available static source code analysis tools cannot fully account for the security consequences of executing the third-party code in an application. GrammaTech has developed an advanced new capability that uses binary analysis to examine third-party code without requiring access to source code. Extending security efforts into third-party code can accelerate development cycles, improve the security of software, and ultimately increase customer satisfaction. Adding binary analysis to the development process helps organizations deliver more trusted applications to customers and eliminate potential liabilities due to vulnerable third-party code.
- Embedded World
- Machine Learning
- Power Electronics
- Dev Tools & OS
- Product Search
- Reference Designs
- Dev Kit Selector
- White Papers
- Webcasts & Events
Previous White Paper
Emerging Communication Technologies Enabling the Internet of Things
The IoT industry incorporates a variety of devices with a wide range of requirements needed to fulfill the ...
Most Recent Flipbooks
Collaborate Without Complexity Using Smart Video Displays
Fifty years after Bell Labs first showed off its Picturephone, videoconferencing systems are ubiquitous across the enterprise—but many solutions are difficult to deploy and use.
Bring Deterministic Data Centers To Edge Computing
Edge computing for IIoT requires end-to-end solutions capable of bringing the performance of the data center into real-time environments.
How Machine Vision Puts The Focus On Quality Control
Process automation is enabling a level of accuracy and productivity that goes beyond human ability. )ne critical area in the factory where automation is making a big difference is quality assurance.
Predictive Ai Keeps Factories Up When Power Goes Down
Maintaining continuous operations is priority-one for any factory. Even a brief power outage can cause major production disruptions.
Why Containers are the Future of the IoT
In the world of agile software development containers are remarkable tools. Because IT and OT are becoming interdependent and closely connected, they often need to use the same design approaches.
Embedded Virtualization Powers Mixed-Criticality IoT Systems
The growth of IIoT means that more systems need to run enterprise applications alongside real-time processes.
Take the Steps to Secure Your Software Supply Chain – What are You Waiting For?
Learn how binary scanning is emerging as a critical activity for securing the complex software supply chain that exists in vehicles.
Why SCADA Is Bad for Smart Factories
Smart factories enable companies to eliminate data silos that often exist between operational technology (OT) and enterprise IT.
5G New Radio: Introduction to the Physical Layer
This paper presents an introductory tutorial to the 5G physical layer and its implementation to support the key 5G target applications of eMBB and URLLC.
Reducing Risk and Accelerating Time to Market with Turret Aiming and Stabilization – The Value of Integrated Stabilization Systems
Turret aiming and stabilization systems on tanks and infantry fighting vehicles must enable steady and precise control in all conditions. Read our white paper to learn more about the challenges...
Qualified Code Generation Greatly Reduces Cost of Safety-Critical Automotive Software
ANSYS SCADE Suite code generator for developing ISO 26262 compliant applications up to ASIL D, the highest safety requirement for automotive applications, substantially reduces the embedded software
Enabling Embedded Devices for Industrial Internet of Things (IIoT)
This paper seeks to outline a few of the key architectural considerations required for the successful operation of smart devices within an IIoT infrastructure with a focus on the software that runs on
18th Century Technology for Modern Medical IoT
Find out what accidentally discovered ancient technology powers a modern medical IoT design in this white paper.
What They Didn’t Teach You in Engineering School About Pressure Drop
A guide to understanding how to solve even complex pressure related design issues.
Practical Guide to Maximizing DC Measurement Performance
The various methods covered in this guide can help you achieve greater accuracy in your applications requiring DC measurements.
4 Game-Changing Underlying Technologies for Advanced Radar
The underlying technologies that enable complex ISR systems are evolving. NI believes these four recent innovations will have the biggest enabling impact on radar technology over the next several year
Bare-Metal High Performance Computing in the Cloud
This whitepaper introduces different types of cloud computing, presents benefits and disadvantages and shows how “bare metal cloud” mitigates the disadvantages, and describes SkyScale’s Accelerated...
Accelerated Genomic Analysis – Applying Massive Parallel Computing to Genomics Secondary Analysis
This whitepaper presents results from a new method developed by Parabricks run on a SkyScale Accelerated Cloud system with up to 16 NVIDIA Tesla V100 GPUs that greatly reduces that time...
Use Intel® SSF to Remove Bottlenecks to AI
Machine learning and AI push the limits of processing, data transport, and storage. To achieve performance and scalability while containing cost, desi...
"Zero Touch" IoT Security Is Key to Continued Growth