Bill Graham

  • Bug-Injector Research Receives IEEE SCAM 2019 Distinguished Paper

    Bug-Injector Research Receives IEEE SCAM 2019 Distinguished Paper

    During the International Working Conference on Source Code Analysis & Manipulation (SCAM), a GrammaTech research publication was awarded the Institute of Electrical and Electronics...

    Read Article
  • C was Programming Language of the Year 2019

    C was Programming Language of the Year 2019

    About a year and a half ago, I was discussing the relative popularity of C and C++ in the face of relative newcomers Python, Java and C#. Surprisingly, the TIOBE index for 2019 shows...

    Read Article
  • Static Analysis in Automotive SPICE

    Static Analysis in Automotive SPICE

    The Automotive SPICE (software process improvement and capability determination) is a software development process standard that outlines the maturity model for software development,...

    Read Article
  • Using CodeSonar to Evaluate Software for the 2019 CWE Top 25 Most Dangerous Software Errors

    Using CodeSonar to Evaluate Software for the 2019 CWE Top 25 Most Dangerous Software Errors

    The Common Weakness Enumeration (CWE) Top 25 most dangerous software errors, a.k.a., the CWE Top 25 is a list of the most common weaknesses that lead to security vulnerabilities. It is...

    Read Article
  • Tainted Data and Format String Attack Strike Again

    Tainted Data and Format String Attack Strike Again

    A recent code execution vulnerability (we also call this a code injection vulnerably) was discovered in Palo Alto Networks’ GlobalProtect SSL VPN, a product that handles SSL handshakes...

    Read Article
  • The Role of Static Analysis in the SAE J3061 Cybersecurity Process Framework

    The Role of Static Analysis in the SAE J3061 Cybersecurity Process Framework

    The Society of Automotive Engineers (SAE) J3061 cybersecurity process framework was created to address a large disconnect between advances in automotive software and the increasing...

    Read Article
  • Shift Left Quality and Security with Automated Unit Testing, Dynamic and Static Analysis

    Shift Left Quality and Security with Automated Unit Testing, Dynamic and Static Analysis

    Our partner, Vector Software, recently announced the official release of the VectorCAST and GrammaTech CodeSonar integration. This prompted this post to discuss the role of static and...

    Read Article
  • Merging of the MISRA C++ and AUTOSAR C++ Guidelines is Good News for Safety Critical Software Development

    Merging of the MISRA C++ and AUTOSAR C++ Guidelines is Good News for Safety Critical Software Development

    The MISRA Consortium recently announced the merger of MISRA C++ 2008 and AUTOSAR C++14 into a common guideline. This is positive news since it combines two key standards for coding in...

    Read Article
  • Linux Foundation’s ELISA Project to Bring Linux to Safety Critical Systems

    Linux Foundation’s ELISA Project to Bring Linux to Safety Critical Systems

    The Linux Foundation’s announcement of the ELISA (Enabling Linux in Safety Applications) project was of interest to us because it requires a significant effort in evaluating open source...

    Read Article
  • Static Analysis and UL 2900 Standard for Software Cybersecurity

    Static Analysis and UL 2900 Standard for Software Cybersecurity

    The UL 2900 is a software cybersecurity standard, specifically a Cybersecurity Assurance Program or CAP, released by Underwriter’s Laboratory (UL). Yes, this is the same company whose...

    Read Article
  • Using Static Analysis with Legacy Code

    Using Static Analysis with Legacy Code

    The adoption of any new tool into an existing software development process and established code base is always a challenge. Static analysis tools are no different but there are steps to...

    Read Article
  • FDA Updates Guidance for Managing Cybersecurity for Medical Devices

    FDA Updates Guidance for Managing Cybersecurity for Medical Devices

    In a previous post, I discussed the role of static analysis in managing cybersecurity for medical devices. It was in reaction to initial guidance published by the FDA in the document...

    Read Article
  • Memory Safety Issues Are Still the Leading Source of Security Vulnerabilities

    Memory Safety Issues Are Still the Leading Source of Security Vulnerabilities

    A recent headline was published in several technology news outlets, at ZDNet “Microsoft: 70 percent of all security bugs are memory safety issues” and Fudzilla, “More than 70 percent of...

    Read Article
  • Integrating Clang Static Analyzer with CodeSonar using SARIF

    Integrating Clang Static Analyzer with CodeSonar using SARIF

    We have discussed the benefits of using SARIF, an open standard for exchanging static analysis results, in a previous post. Integration between tools is simplified by using this open...

    Read Article
  • Using Static Analysis to Detect API Usage Anomalies

    Using Static Analysis to Detect API Usage Anomalies

    Read Article
  • CodeSonar in the SWAMP

    CodeSonar in the SWAMP

    INTRODUCTION: The Software Assurance Marketplace (SWAMP) is an open tool set designed to improve quality and security started by the Department of Homeland Security Science and...

    Read Article
  • The Role of Static Application Security Tools (SAST) in DevSecOps

    The Role of Static Application Security Tools (SAST) in DevSecOps

    The term DevSecOps is a contraction of DevOps, itself a contraction of Developer Operations, and Security. It’s the in-vogue buzzword for 2018 that, despite the hype, does have positive...

    Read Article
  • How Does the OWASP Top 10 Apply to C/C++ Development?

    How Does the OWASP Top 10 Apply to C/C++ Development?

    The Open Web Application Security Project (OWASP) is a non-profit organization focused on improving web software security. Each year they publish a top ten list of the most critical web...

    Read Article
  • What Does Application Security Mean for Embedded Devices?

    What Does Application Security Mean for Embedded Devices?

      The term application security is a popular one in the software community. When people refer to application security, they typically talk about enterprise applications, the...

    Read Article
  • Large Scale Weapon Systems Cybersecurity Threat is a Concern and Opportunity

    Large Scale Weapon Systems Cybersecurity Threat is a Concern and Opportunity

    The Government Accounting Office (GAO) was asked to review the state of the Department of Defense (DOD) weapons systems’ cybersecurity. Unfortunately, their findings were not...

    Read Article
  • loading
    Loading More...