How To Improve Security and Perform Security Audits

  • Eliminating Vulnerabilities in Third-Party Code with Binary Analysis

    Eliminating Vulnerabilities in Third-Party Code with Binary Analysis

    Read the document
  • Protecting Against Tainted Data in Embedded Apps with Static Analysis

    Protecting Against Tainted Data in Embedded Apps with Static Analysis

    Read the document
  • Addressing IoT's Impact on Software Engineering

    Addressing IoT's Impact on Software Engineering

    Read the document
  • A Four-Step Guide to Security Assurance for IoT Devices

    A Four-Step Guide to Security Assurance for IoT Devices

    Read the document
  • VDC finds IoT fueling faster software development but with greater requirements for security protection

    VDC finds IoT fueling faster software development but with greater requirements for security protection

    INTRODUCTION: VDC’s recent report “Software Assembly Practices Necessitate More Precautions” highlights a significant software challenge for IoT device manufacturers. A majority of...

    Read Article
  • What is Taint Checking?

    What is Taint Checking?

          Taint checking? This isn't a trap, I promise. It sounds vulgar, but its etymology is perfectly reasonable, stemming from the notion...

    Read Article
  • The Human Internet of Things (HIoT)

    The Human Internet of Things (HIoT)

     

    Read Article
  • Using Static Analysis to Improve IIoT Device Security

    Using Static Analysis to Improve IIoT Device Security

      INTRODUCTION: The Industrial Internet of Things is unique in that devices that compose industrial control systems are often insecure due to limitations in their design and capability. On top of...

    Read Article
  • Tackling the Software Development Challenges of the Industrial Internet of Things (IIOT)

    Tackling the Software Development Challenges of the Industrial Internet of Things (IIOT)

        INTRODUCTION: The Internet of Things is coming to industrial systems in a big way (the “IIOT”). But IIOT isn't just IOT with an extra 'I' -- industrial systems differ greatly in architecture,...

    Read Article
  • An Interview with GrammaTech's David Hauck2:14

    An Interview with GrammaTech's David Hauck

    David Hauck discusses cyber security and the immense impact of the Internet of Things (IoT).

    Watch Video
  • How Vulnerable Are You?

    How Vulnerable Are You?

        INTRODUCTION: The promise of static analysis is compelling but our most frequently-asked question is, "Where do we start?" Security is a top-of-mind concern, so we are also frequently asked...

    Read Article
  • CodeSonar's Visual Tainted Data Analysis2:32

    CodeSonar's Visual Tainted Data Analysis

    CodeSonar's tainted dataflow analysis allows you to explore potentially dangerous data flows in a clear, visual way.

    Watch Video
  • An Ounce of Prevention: Software hardening for securing IoT devices

    An Ounce of Prevention: Software hardening for securing IoT devices

        INTRODUCTION: Every IoT and embedded device manufacturer endeavors to field secure and safe products. However, even with the robust development processes, it's difficult to ensure complete...

    Read Article
  • How Software Quality Threatens the Success of the Internet of Things

    How Software Quality Threatens the Success of the Internet of Things

    The Nest is a highly innovative, electronic smart home thermostat manufactured by Alphabet (formerly Google). It is by all accounts a well-designed device, replacing a traditional home thermostat...

    Read Article
  • Don't leave your device software open to failure2:25

    Don't leave your device software open to failure

    Learn about GrammaTech's advanced technologies, services, and software-assurance solutions on the cutting edge of IoT.

    Watch Video
  • Step Four: Security Assurance for IoT Devices - Assessing third party code

    INTRODUCTION: According to VDC Research, 45% of embedded projects are outsourcing product development. The use of outsourced, open source, commercial software (COTS), legacy source, and binary...

    Read Article
  • Step Three: Security Assurance for IoT Devices - Leverage Automated Tools

    Step Three: Security Assurance for IoT Devices - Leverage Automated Tools

    INTRODUCTION: For IoT and M2M device security assurance, it's critical to introduce automated software development tools into the development lifecycle. Although software tools' roles in quality...

    Read Article
  • Step Two: Security Assurance for IoT Devices - Threat Assessment  and Analysis

    Step Two: Security Assurance for IoT Devices - Threat Assessment and Analysis

    INTRODUCTION: A key ingredient to a security-first design approach is an end-to-end threat assessment and analysis. Your device is part of a larger IoT infrastructure, so understanding the...

    Read Article
  • Step One: Security Assurance for IoT Devices - Security First Design

    INTRODUCTION: The Stuxnet malware was a wake-up call for embedded device security when it became public knowledge in 2010.  Its sophistication and purpose made it clear that industrial control...

    Read Article
  • A Four-Step Guide to Security Assurance for IoT Devices

    A Four-Step Guide to Security Assurance for IoT Devices

    INTRODUCTION: Powered by the forces of the cloud, connected endpoints, wireless technologies, and big data, the Internet of Things (IoT) and machine to machine (M2M) evolution is forming a...

    Read Article
  • loading
    Loading More...