Software Assurance            Software Hardening            Autonomic Computing
Reducing the Risk of the Software Supply Chain in Medical Devices

INTRODUCTION:

Medical devices rely on third-party and in-house existing software as needed, to meet functionality, cost, and...

How Vulnerable Are You?

INTRODUCTION:

The promise of static analysis is compelling but our most frequently-asked question is, "Where do we start?"...

Don’t trust any input! Prevent vulnerabilities from becoming exploits with tainted data analysis

INTRODUCTION:

One of the most common attack vectors is user (or other) input into a system. It's very risky to...

How Static Analysis Improves Safety and Security for Multicore Platforms

INTRODUCTION:

Multicore processors are ubiquitous in embedded devices but still pose a challenge for developing...