Going Beyond Fuzzing for Airtight Security

Fuzzing White Blog Series: Blog 3 Going Beyond Fuzzing for Airtight Security

icon/arrow Back to news Even when used with the best analysis tools, fuzzing will not provide perfect code coverage. For your most security-critical applications, you may need to go further. In Part 1 of this series , we introduced the software verification technique called fuzzing.  We described what it is, who uses it and why, the […]

Optimizing Fuzzing to Eliminate More Vulnerabilities

Fuzzing Blog 2: Optimizing Fuzzing to Eliminate More Vulnerabilities

icon/arrow Back to news Fuzzing has its limitations. Formal methods can help you overcome them. In the first post of this series , we introduced the software verification technique called fuzzing.  We described what it is, who uses it and why, the tools involved, and the benefits of fuzzing. In this post, we’ll examine the limitations […]

An Introduction to Fuzzing

Fuzzing Blog 1:An Introduction to Fuzzing

Back to news What it is, who uses it and why, its benefits and the tools involved? The rapid growth in the connectivity of software-driven products over the last several years is expected to continue for the foreseeable future.[1], [2]  That growth, however, has also increased both the attack surfaces of those products and the […]

Application of Formal Methods to High-Security Requirements Software

Application of Formal Methods to High-Security Requirements of Software Webinar with ASRG and TrustInSoft

icon/arrow Back to news Watch this webinar on the application of formal methods to high-security requirements of software presented by ASRG Watch the Webinar https://youtu.be/YLWMn0Lk4rI Watch this webinar hosted by the Automotive Security Research Group (ASRG) to explore how Formal Methods have become a mainstream technology to address safety and security across various industry verticals, including […]

TrustInSoft Analyzer Drives Results on the Toyota Infotechnology Center (ITC) Test Suite

TrustInSoft Drives Results on ITC Test Suite

  Back to news Learn more about the benchmark of static analysis tools for the purpose of comparing solutions for automotive safety and security practices & TrustInSoft Analyzer’s results on the ITC test suite Context The Toyota Infotechnology Center (ITC) test suite, created for C/C++ static analysis tools, was designed to quantitatively evaluate industry tools […]

Most Influential Paper of PLDI 2012, Awarded at PLDI 2022- Chief Scientist Pascal Cuoq

Most Influential Paper of PLDI 2012, Awarded at PLD 2022I- TrustInSoft Chief Scientist Pascal Cuoq

Back to news TrustInSoft’s Pascal Cuoq wins the prestigious honor of being an author of an influential paper that has stood the test of time PLDI 2012 Award-Influential Paper Stands the Test of Time TrustInSoft’s very own Chief Scientist and co-founder Pascal Cuoq was recently awarded the Most Influential Paper of PLDI 2012 at the […]

Why low-level code has become the new focal point of cybersecurity for embedded systems

low-level code blog 1- why low-level code has become the new focal point of cybersecurity for embedded systems

Back to news The rapid expansion of connected devices and applications poses cybersecurity threats for embedded systems, download the free white paper to learn about the risks and possible solutions From smartphones to gaming consoles, automobiles to self-service fuel pumps, medical implants to smart-home technologies, the number of connected devices that touch our lives and […]