Going Beyond Fuzzing for Airtight Security

Fuzzing White Blog Series: Blog 3 Going Beyond Fuzzing for Airtight Security; Even when used with the best analysis tools, fuzzing will not provide perfect code coverage. For your most security-critical applications, you may need to go further.

icon/arrow Back to news Even when used with the best analysis tools, fuzzing will not provide perfect code coverage. For your most security-critical applications, you may need to go further. In Part 1 of this series , we introduced the software verification technique called fuzzing.  We described what it is, who uses it and why, the […]

Optimizing Fuzzing to Eliminate More Vulnerabilities

Graphic Fuzzing Blog 2: Optimizing Fuzzing to Eliminate More Vulnerabilities; Fuzzing has its limitations, formal methods can help you overcome them

icon/arrow Back to news Fuzzing has its limitations. Formal methods can help you overcome them. In the first post of this series , we introduced the software verification technique called fuzzing.  We described what it is, who uses it and why, the tools involved, and the benefits of fuzzing. In this post, we’ll examine the limitations […]

An Introduction to Fuzzing

Graphic Fuzzing Blog 1: An Introduction to Fuzzing, what it is, who uses it and why, its benefits and the tools involved

Back to news What it is, who uses it and why, its benefits and the tools involved? The rapid growth in the connectivity of software-driven products over the last several years is expected to continue for the foreseeable future.[1], [2]  That growth, however, has also increased both the attack surfaces of those products and the […]

Fuzzing and Beyond

Fuzzing and Beyond: white paper by TrustInSoft

Back to news What is fuzzing? What is it used for? How can this technology be taken even further? Technical White Paper: Fuzzing and Beyond Hackers use fuzzing to find and exploit weaknesses in your code. You can use fuzzing to stop them. TrustInSoft’s new white paper, Fuzzing and Beyond, explains everything you need to […]

Application of Formal Methods to High-Security Requirements Software

Application of Formal Methods to High-Security Requirements of Software Webinar with ASRG and TrustInSoft

icon/arrow Back to news Watch this webinar on the application of formal methods to high-security requirements of software presented by ASRG Watch the Webinar https://youtu.be/YLWMn0Lk4rI Watch this webinar hosted by the Automotive Security Research Group (ASRG) to explore how Formal Methods have become a mainstream technology to address safety and security across various industry verticals, including […]

TrustInSoft Analyzer Drives Results on the Toyota Infotechnology Center (ITC) Test Suite

Image with text TrustInSoft Drives Results on ITC Test Suite, in the background is a large automotive vehicle.

icon/arrow Back to news Learn more about the benchmark of static analysis tools for the purpose of comparing solutions for automotive safety and security practices & TrustInSoft Analyzer’s results on the ITC test suite Context The Toyota Infotechnology Center (ITC) test suite, created for C/C++ static analysis tools, was designed to quantitatively evaluate industry tools […]

Why low-level code has become the new focal point of cybersecurity for embedded systems

low-level code blog 1- why low-level code has become the new focal point of cybersecurity for embedded systems

icon/arrow Back to news The rapid expansion of connected devices and applications poses cybersecurity threats for embedded systems, download the free white paper to learn about the risks and possible solutions From smartphones to gaming consoles, automobiles to self-service fuel pumps, medical implants to smart-home technologies, the number of connected devices that touch our lives […]