Going Beyond Fuzzing for Airtight Security

icon/arrow Back to news Even when used with the best analysis tools, fuzzing will not provide perfect code coverage. For your most security-critical applications, you may need to go further. In Part 1 of this series , we introduced the software verification technique called fuzzing. We described what it is, who uses it and why, the […]
Optimizing Fuzzing to Eliminate More Vulnerabilities

icon/arrow Back to news Fuzzing has its limitations. Formal methods can help you overcome them. In the first post of this series , we introduced the software verification technique called fuzzing. We described what it is, who uses it and why, the tools involved, and the benefits of fuzzing. In this post, we’ll examine the limitations […]
TrustInSoft Analyzer Drives Results on the Toyota Infotechnology Center (ITC) Test Suite

icon/arrow Back to news Learn more about the benchmark of static analysis tools for the purpose of comparing solutions for automotive safety and security practices & TrustInSoft Analyzer’s results on the ITC test suite Context The Toyota Infotechnology Center (ITC) test suite, created for C/C++ static analysis tools, was designed to quantitatively evaluate industry tools […]
Why exhaustive static analysis is ideally suited for ensuring the security of low-level code

icon/arrow Back to news Read more in the free white paper: From Bare Metal to Kernel Code: How Exhaustive Static Analysis Can Guarantee Airtight Security in Low-level Software and Firmware and discover two practical use cases In Part 1 of this series, we discussed why ensuring the security of low-level code—the code used in OS kernels, device […]
Why conventional static analysis and software testing are not ideal for removing security vulnerabilities from low-level code

icon/arrow Back to news Discover some of the drawbacks to traditional testing methods and modern alternatives in this blog or for the full white paper, click here In the first post of this series, we discussed why ensuring the security of low-level code—the code used in OS kernels, device firmware and other applications that interface directly […]
Why low-level code has become the new focal point of cybersecurity for embedded systems

icon/arrow Back to news The rapid expansion of connected devices and applications poses cybersecurity threats for embedded systems, download the free white paper to learn about the risks and possible solutions From smartphones to gaming consoles, automobiles to self-service fuel pumps, medical implants to smart-home technologies, the number of connected devices that touch our lives […]
TrustInSoft to Showcase Advanced Embedded Software Bug Detection at CES 2023: Introducing Proven Zero Bug Software

icon/arrow Back to news Experience a live demo of TrustInSoft Analyzer at the booth with Technical Presales Consultant Olivier Korach See TrustInSoft Analyzer in Action at the Consumer Electronics Show 2023 In Las Vegas TrustInSoft will be demonstrating live advanced bug detection with its interactive booth at the 2023 CES show in Las Vegas. TrustInSoft, […]
TrustInSoft Enters the Automotive Market with Exhaustive Static Code Analysis Tool For Safety and Cybersecurity Critical Software

Back to news Visit TrustInSoft at the Consumer Electronics Show at the French Automotive Pavilion in the Las Vegas Convention Center West Hall, Booth 5400 to learn more and see a demo. /*! elementor – v3.9.0 – 06-12-2022 */ .elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=”.svg”]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block} /*! elementor – v3.9.0 – 06-12-2022 */ .elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading […]
CERT C Benchmark

icon/arrow Back to news What is CERT C & why is it especially relevant to improve code safety, reliability, and security? Table of Contents What is CERT C & why is it especially relevant to improve code safety, reliability, and security? The Benchmark Breakdown Undefined Behavior Only Rules All CERT C Rules Medium-High Severity Rules […]
Delivering Safety & Cybersecurity Critical Software Faster and Cheaper

icon/arrow Back to news How four leading safety-critical systems developers have used TrustInSoft Analyzer to eliminate pesky bugs, guarantee cybersecurity, improve customer relationships, and reduce verification costs Introduction In Part 1 of this series , we discussed why software for safety-critical systems is hitting an “affordability wall,” why reliance on wireless connectivity in those systems is […]