The majority of software that runs on embedded devices is now developed by external sources, not in-house development teams and source code is often unavailable. Without access to the source code, commercially available static source code analysis tools cannot fully account for the security consequences of executing the third-party code in an application. GrammaTech has developed an advanced new capability that uses binary analysis to examine third-party code without requiring access to source code. Extending security efforts into third-party code can accelerate development cycles, improve the security of software, and ultimately increase customer satisfaction. Adding binary analysis to the development process helps organizations deliver more trusted applications to customers and eliminate potential liabilities due to vulnerable third-party code.
- Embedded Security Webinar Series
- Machine Learning
- Power Electronics
- Dev Tools & OS
- Dev Kit Selector
- White Papers
- Upcoming Activities & Events
- Embedded Executive
For safety-critical code, functional testing that ensures that the application does what it is supposed to ...
We also recommend:
Deciding what hardware to use for your embedded GUI application? From understanding performance and storage requirements to estimating memory needs, you’ll be faced with quite a few important...
Initial netlists in a formal verification process must be optimized, so additional logic is needed for Design for Test. Here we offer formal verification flow and debugging techniques for 16 nm node.
Multicore embedded systems are becoming increasingly common. This paper looks at using a hypervisor or multicore framework, or both, to control and mange a multicore system, which is a critical...
There are many things to consider when moving from RTOS to Linux for embedded projects. This white paper provides practical information so developers can be fully aware of the trade-offs and the...
The Past, Present and Future of Cybersecurity in Embedded Systems explores how security requirements have changed from the early days of embedded systems. It examines how vulnerabilities have...
SystemLink helps enable seamless test operations and data management across an entire organization.
ESD Alliance to Lead Joint Effort with Cadence, Mentor, a Siemens Business, and Synopsys to Create Server Certification Protocol
OpenXR is an open, industry standard API that enables the development and deployment of portable, cross-platform AR/VR (XR) runtimes.
You need to be sure that the software you send to the plant is exactly the same as the software that gets installed into the manufactured products. No exceptions.
Why do less than four percent of IoT devices implement the security measures necessary to protect an organization's IP and customers from local or network-borne threats?
In this series of five webcasts, we’ll run through the five key security-related problems that will impact your design, and more importantly, how to solve them.
DesignSpark Mechanical features built-in help text, quick-guide tutorials, example designs, and access to a 3D catalog with 3D models from leading component manufacturers.
Spectrum analyzers are used to capture and display wanted and unwanted signals, as well as enable a range of measurements including power, frequency, modulation, and distortion. This paper will...
Secure contexts are a must in industrial platforms, especially if it’s a “connected” platform.
You’ve spent months or even years creating IP that belongs to your company and/or its customers. In many cases, that IP is what makes you stand out from your competitors.
In this week’s Dev Kit Weekly, Perry is going on lock-down the MachX03D Development Board from Lattice Semiconductor.
According to industry analysts, we could see one trillion IoT connections by the year 2035, with the transfer of more than 2 Zbytes of data just from consumer devices alone.
Jumpstarts new-application design for industrial and smart-building markets.
SLX FPGA 2020.2 includes a Vivado HLS project importer to get started with an existing Xilinx HLS project.
This week on the Embedded Insiders, Brandon and Rich discuss an age-old controversy: What’s more secure? Proprietary or open-source software?