Software Assurance            Software Hardening            Autonomic Computing
How Vulnerable Are You?

INTRODUCTION:

The promise of static analysis is compelling but our most frequently-asked question is, "Where do we start?"...

Don’t trust any input! Prevent vulnerabilities from becoming exploits with tainted data analysis

INTRODUCTION:

One of the most common attack vectors is user (or other) input into a system. It's very risky to...

How Static Analysis Improves Safety and Security for Multicore Platforms

INTRODUCTION:

Multicore processors are ubiquitous in embedded devices but still pose a challenge for developing...

An Ounce of Prevention: Software hardening for securing IoT devices

INTRODUCTION:

Every IoT and embedded device manufacturer endeavors to field secure and safe products. However, even with the...