Software Assurance            Software Hardening            Autonomic Computing
Cyber Grand Challenge at the Smithsonian

The Cyber Grand Challenge was created by DARPA (Defense Advanced Research Projects Agency) to advance the state of security...

How to Use Static Analysis to Improve NERC Critical Infrastructure Protection Compliance

INTRODUCTION:

Securing connected industrial control systems (ICS) or Supervisory Control and Data Acquisition (SCADA) for...

Managing Third-Party Code Security and Quality with Binary Analysis

INTRODUCTION:

According to VDC Research, 45% of embedded projects involve outsourcing product development. The use of...

The Role of Static Analysis in a Secure Software Development Life Cycle (SDLC)

INTRODUCTION:

"When should static analysis be applied?" The answer to this question is fairly straightforward: "whenever...

Software Forensics: Beyond the Law

INTRODUCTION:

Traditionally, the term "forensics" is the use of science to discover evidence of criminal activity. Extending...