×

Ready to download this white paper?

First Name
Last Name
Job Title
Company
Phone Number
Address
Country
You may receive a request for your feedback from OpenSystems Media. Read our new Privacy Policy to understand what data we collect, why we collect it, and what we do with it.
Europe OptIn
Your download is ready!
Error - something went wrong!
   

Protecting Against Tainted Data in Embedded Apps with Static Analysis

November 1, 2018

Attacks against embedded systems are growing in frequency as malicious hackers become more sophisticated in their methods. These vulnerabilities are being exploited by hostile users to gain access to a system so they may subvert its use. These exploits are typically triggered when a hostile user sends data over an input channel. 

Programmers can defend against these defects by treating input data as potentially hazardous (tainted) and carefully checking the data for validity before use. It is challenging, though, to find these locations because it requires manually tracing the flow of data through the program. This paper describes a static analysis technique – taint analysis – that can be used to find how potentially hazardous inputs can flow through a program to reach sensitive parts of code, empowering developers to identify and eliminate these dangerous vulnerabilities much more effectively.

Previous Article
Greenliant Sampling Industrial Temperature SATA M.2 ArmourDrive SSDs Up to 1 Terabyte
Greenliant Sampling Industrial Temperature SATA M.2 ArmourDrive SSDs Up to 1 Terabyte

Today Greenliant introduced its new 87 PX Series SATA M.2 ArmourDrive SSDs for industrial, networking, secu...

Next Article
Innodisk Introduces Next-Generation NAND Flash
Innodisk Introduces Next-Generation NAND Flash

Innodisk launched its industrial-grade 3D NAND SSD series consisting of DRAM-less 3TE7 and the 3TG6-P.

Compare Distributor Pricing & Part Availability

Enter Part Number