×

Ready to download this white paper?

First Name
Last Name
Job Title
Company
Phone Number
Address
Country
Your download is ready!
Error - something went wrong!
   

Eliminating Vulnerabilities in Third-Party Code with Binary Analysis

July 5, 2017

The majority of software that runs on embedded devices is now developed by external sources, not in-house development teams and source code is often unavailable. Without access to the source code, commercially available static source code analysis tools cannot fully account for the security consequences of executing the third-party code in an application. GrammaTech has developed an advanced new capability that uses binary analysis to examine third-party code without requiring access to source code. Extending security efforts into third-party code can accelerate development cycles, improve the security of software, and ultimately increase customer satisfaction.  Adding binary analysis to the development process helps organizations deliver more trusted applications to customers and eliminate potential liabilities due to vulnerable third-party code.

Previous Article
How Hollywood gets biometrics wrong (and what it gets right)

Setting aside the question of whether rogue robots will create a dystopian future, there is one area that a...

Next Article
4 trends to watch in the IoT market now

2017 is shaping up to be a significant and disruptive year for the development of the Internet of Things (I...

×

Stay updated on security-related design topics with the security edition of our Embedded Daily newsletter.

Subscribed! Look for 1st copy soon.
Error - something went wrong!