Why low-level code has become the new focal point of cybersecurity for embedded systems

Back to news The rapid expansion of connected devices and applications poses cybersecurity threats for embedded systems, download the free white paper to learn about the risks and possible solutions From smartphones to gaming consoles, automobiles to self-service fuel pumps, medical implants to smart-home technologies, the number of connected devices that touch our lives and […]

From Bare Metal to Kernel Code:How Exhaustive Static Analysis Can Guarantee Airtight Security in Low-level Software and Firmware

Back to news TrustInSoft’s new white paper examines how exhaustive static analysis can guarantee airtight security in low-level software and firmware applications… and why traditional static analysis and software testing can’t Why Do You Need To Achieve Airtight Security in Low-Level Software and Firmware? The widespread proliferation of connectivity in embedded systems has made low-level […]

CERT C Benchmark

Back to news What is CERT C & why is it especially relevant to improve code safety, reliability, and security? Table of Contents What is CERT C & why is it especially relevant to improve code safety, reliability, and security? The Benchmark Breakdown Undefined Behavior Only Rules All CERT C Rules Medium-High Severity Rules High […]

Proving the Security of Low-Level Software Components & TEEs

icon/arrow Back to news The role of formal methods in securing low-level software components and TEEs Semiconductors and Their Significance Semiconductors are at the core of many things we see around us: from game consoles, mobile devices, smart meters to automotive vehicles to aircrafts and equipment used in industrial settings and mission critical domains such […]

How Exhaustive Static Analysis can Prove the Security of TEEs

icon/arrow Back to news TrustInSoft’s new white paper, How Exhaustive Static Analysis Can Prove the Security of TEEs, explains why organizations that rely on trusted execution environments within their devices should adopt this new technology. The Trusted Execution Environment (TEE) within a processor has become a key component for protecting sensitive data and applications from unauthorized access.  To fulfill […]

TrustInSoft’s Exhaustive Static Analysis Proves the Security of Trusted Execution Environments

icon/arrow Back to news Download New TrustInSoft White Paper and Learn How to Guarantee Devices are Error-free, Secure and Reliable Paris and San Francisco – November 9, 2021 PRESS RELEASE TrustInSoft’s Exhaustive Static Analysis Proves the Security of Trusted Execution Environments Download New TrustInSoft White Paper and Learn How to Guarantee Devices are Error-free, Secure […]