Software Assurance            Software Hardening            Autonomic Computing
Reducing the Risk of the Software Supply Chain in Medical Devices

INTRODUCTION:

Medical devices rely on third-party and in-house existing software as needed, to meet functionality, cost, and...

Don’t trust any input! Prevent vulnerabilities from becoming exploits with tainted data analysis

INTRODUCTION:

One of the most common attack vectors is user (or other) input into a system. It's very risky to...

Is Your Codebase Too Male?

CodeSonar’s users can sometimes come up with very interesting code properties to check. Last week I had a conversation with...

Using Benchmarks to Assess Static Analysis Tools

Researchers from Toyota recently published a paper entitled "Test Suites for Benchmarks of " at the 26th...