How Sound Static Analysis Complements Heuristic Analysis

Not all static analysis tools work the same, there are in fact a spectrum of tools that use a variety of techniques ranging...

Tainted Data and Format String Attack Strike Again

A recent code execution vulnerability (we also call this a code injection vulnerably) was discovered in Palo Alto Networks’...

The Role of Static Analysis in the SAE J3061 Cybersecurity Process Framework

The Society of Automotive Engineers (SAE) J3061 cybersecurity process framework was created to address a large disconnect...

Linux Foundation’s ELISA Project to Bring Linux to Safety Critical Systems

The Linux Foundation’s announcement of the ELISA (Enabling Linux in Safety Applications) project was of interest to us...

Tool Chain Qualification in Safety Critical Systems

Safety critical software usually entails some kind of certification, qualification or approval from a standards body in...