The majority of software that runs on embedded devices is now developed by external sources, not in-house development teams and source code is often unavailable. Without access to the source code, commercially available static source code analysis tools cannot fully account for the security consequences of executing the third-party code in an application. GrammaTech has developed an advanced new capability that uses binary analysis to examine third-party code without requiring access to source code. Extending security efforts into third-party code can accelerate development cycles, improve the security of software, and ultimately increase customer satisfaction. Adding binary analysis to the development process helps organizations deliver more trusted applications to customers and eliminate potential liabilities due to vulnerable third-party code.
- Dev Tools & OS
- Machine Learning
- Reference Designs
- Dev Kit Selector
- White Papers
- Webcasts & Events
- Product Search
- Parts Search
How Hollywood gets biometrics wrong (and what it gets right)
Setting aside the question of whether rogue robots will create a dystopian future, there is one area that a...
Subscribed! Look for 1st copy soon.
Error - something went wrong!
We also recommend:
Adacore discusses "Make with Ada" challenge and new product announcement at #ARM TechCon 2017
Jamie Ayre with Adacore talks to Rich Nass with Embedded Computing Design about the ``Make with Ada'' challenge that occurred earlier this year. The contest aimed to help the embedded software communi
IAR Systems discussing safety and security at #ARM TechCon 2017
SANTA CLARA, CA -- Stefan Skarin, CEO at IAR Systems, talked to Rich Nass with Embedded Computing Design at ARM TechCon 2017 about safety and security. Stefan discusses code quality, security for deve
Wibu-Systems Launches CodeMeter Cloud Licensing Platform
Cloud Licensing Technology to be Showcased at SPS IPC Drives November 28-30, 2017 in Nuremberg, Germany
Advantech and IGEL Offer Easy-to-Manage Cloud Computing Solutions for the Healthcare Sector
Simple Endpoint Management and High-Performance Hardware Combine to Support Demanding Hospital Applications
Learn how to keep IoT devices secure – from design to decommission
In this final class, we will cover the critical aspects of how to test and deploy our IoT solution, and how to keep it secure and operational through ongoing monitoring and maintenance.
Have we forgotten what the ancients taught us in building defense systems?
I find the multilayered defense system built into many ancient forts fascinating. Fort Dún Aonghasa in Ireland is a great example of how a multilayered defense system was used.
SecureRF and Intel deliver future-proof FPGA security
Identifying secure firmware update mechanisms and open source options for embedded Linux devices
The traditional, and best-until-proven-otherwise way of updating an embedded device is performing a whole image update. In baremetal devices, this would be the whole image with all the device firmware
Skkynet to Hold OPC UA Sandpit Event in Osaka
Technology providers from six countries gather in Japan to demonstrate secure Industrial IoT cloud connectivity for OPC UA products.
Demystifying Hardware Full Disk Encryption Technology for Military Data Storage
NAND flash media reliability concerns have largely been addressed through (1) advances in error correction code (ECC) and wear leveling algorithms and (2) NAND flash over-provisioning.
A Low-risk, COTS Approach to Building Safety Certifiable Processing Subsystems
How to affordably decrease safety critical processing subsystem development time and program risk using DO-178 / DO-254 certifiable off-the-shelf building blocks.
Learn how to design safe, secure, and reliable IoT critical infrastructure systems
This class, led by Charles J. Lord, PE, President and Chief Trainer at Blue Ridge Advanced Design and Automation, will teach you how to adapt and stay relevant in this new software-defined world.
Build security into the connected car development life cycle
Best practices dictate that security, like functional safety, can’t be an afterthought. It must be part of the software development life cycle as a whole.
Embedded Insiders Podcast – Secure your network, no matter the cost
As the old axiom goes, “if you have to ask the price, then you can’t afford it.” In fact, depending on the data that you’re protecting, it’s possible that there’s no cost that’s too high.
Wibu-Systems Joins Dell Internet of Things (IoT) Solutions Partner Program
Partnership Reinforces Commitment Towards Secure IoT Deployments
Leti and Partners in PiezoMAT Project Develop New Fingerprint Technology for Highly Reliable Security and ID Applications
Leti today announced that the European R&D project known as PiezoMAT has developed a pressure-based fingerprint sensor that enables resolution more than twice as high as currently required by the...
ISO 26262 a Pain in the ASIL?
There is an ever-widening range of automotive electrical and/or electronic (E/E/PE) systems such as adaptive driver assistance systems, anti-lock braking systems, steering and airbags.
Addressing Your Insecurities with CERT C
The CERT C Coding Standard consists of a set of guidelines designed to assist in the development of safe, reliable, and secure systems.
DO-178C: Get on a High with your Software Development
This technical briefing is an introduction to both the DO-178C standard, and the way in which automated tools can help achieve its objectives.
Five Minutes With…Louis Parks, CEO, SecureRF