Ready to download this white paper?

First Name
Last Name
Job Title
Phone Number
You may receive a request for your feedback from OpenSystems Media. Read our new Privacy Policy to understand what data we collect, why we collect it, and what we do with it.
Europe OptIn
Your download is ready!
Error - something went wrong!

Eliminating Vulnerabilities in Third-Party Code with Binary Analysis

July 5, 2017

The majority of software that runs on embedded devices is now developed by external sources, not in-house development teams and source code is often unavailable. Without access to the source code, commercially available static source code analysis tools cannot fully account for the security consequences of executing the third-party code in an application. GrammaTech has developed an advanced new capability that uses binary analysis to examine third-party code without requiring access to source code. Extending security efforts into third-party code can accelerate development cycles, improve the security of software, and ultimately increase customer satisfaction.  Adding binary analysis to the development process helps organizations deliver more trusted applications to customers and eliminate potential liabilities due to vulnerable third-party code.

Previous Article
Dig deep into safety-critical code testing with coverage analysis

For safety-critical code, functional testing that ensures that the application does what it is supposed to ...

Next Article
Hardware emulation: Tool of choice for verification and validation

Design in any discipline - electronics, mechanical, aerospace, etc. - begins with a specification that capt...