×

Ready to download this white paper?

First Name
Last Name
Job Title
Company
Phone Number
Address
Country
You may receive a request for your feedback from OpenSystems Media. Read our new Privacy Policy to understand what data we collect, why we collect it, and what we do with it.
Europe OptIn
Your download is ready!
Error - something went wrong!
   

Protecting Against Tainted Data in Embedded Apps with Static Analysis

November 1, 2018

Attacks against embedded systems are growing in frequency as malicious hackers become more sophisticated in their methods. These vulnerabilities are being exploited by hostile users to gain access to a system so they may subvert its use. These exploits are typically triggered when a hostile user sends data over an input channel. 

Programmers can defend against these defects by treating input data as potentially hazardous (tainted) and carefully checking the data for validity before use. It is challenging, though, to find these locations because it requires manually tracing the flow of data through the program. This paper describes a static analysis technique – taint analysis – that can be used to find how potentially hazardous inputs can flow through a program to reach sensitive parts of code, empowering developers to identify and eliminate these dangerous vulnerabilities much more effectively.

Previous White Paper
Making Safety-Critical Software Development Affordable with Static Analysis
Making Safety-Critical Software Development Affordable with Static Analysis

Safety-critical software is becoming exceedingly expensive to develop and manufacturers are looking for sol...

Next White Paper
Containerized Linux: The Secret to IoT Security
Containerized Linux: The Secret to IoT Security

A desire in the development community to use Linux is often at odds with the security requirements of an or...