Why low-level code has become the new focal point of cybersecurity for embedded systems

low-level code blog 1- why low-level code has become the new focal point of cybersecurity for embedded systems

icon/arrow Back to news The rapid expansion of connected devices and applications poses cybersecurity threats for embedded systems, download the free white paper to learn about the risks and possible solutions From smartphones to gaming consoles, automobiles to self-service fuel pumps, medical implants to smart-home technologies, the number of connected devices that touch our lives […]

From Bare Metal to Kernel Code:How Exhaustive Static Analysis Can Guarantee Airtight Security in Low-level Software and Firmware

TrustInSoft White paper: From bare metal to kernel code: How exhaustive static analysis can guarantee airtight security in low-level software and firmware. Guarantee airtight security in low-level software and firmware

icon/arrow Back to news TrustInSoft’s new white paper examines how exhaustive static analysis can guarantee airtight security in low-level software and firmware applications… and why traditional static analysis and software testing can’t Why Do You Need To Achieve Airtight Security in Low-Level Software and Firmware? The widespread proliferation of connectivity in embedded systems has made […]

CERT C Benchmark

CERT C TOOL BENCHMARK, What is CERT C & why is it especially relevant to improve code safety, reliability, and security?

icon/arrow Back to news What is CERT C & why is it especially relevant to improve code safety, reliability, and security?  Table of Contents What is CERT C & why is it especially relevant to improve code safety, reliability, and security? The Benchmark Breakdown Undefined Behavior Only Rules All CERT C Rules Medium-High Severity Rules […]

Proving the Security of Low-Level Software Components & TEEs

Graphic: Proving the security of Low-level software components & TEEs

Back to news The role of formal methods in securing low-level software components and TEEs Semiconductors and Their Significance Semiconductors are at the core of many things we see around us: from game consoles, mobile devices, smart meters to automotive vehicles to aircrafts and equipment used in industrial settings and mission critical domains such as […]

How Exhaustive Static Analysis can Prove the Security of TEEs

Back to news TrustInSoft’s new white paper, How Exhaustive Static Analysis Can Prove the Security of TEEs, explains why organizations that rely on trusted execution environments within their devices should adopt this new technology. The Trusted Execution Environment (TEE) within a processor has become a key component for protecting sensitive data and applications from unauthorized access.   To fulfill […]

Bye, bye Pegasus – New Application Security Test

Graphic: bye bye project pegasus zero bug mobile application security test

  Back to news TrustInSoft Mathematically Guarantees Zero-Bug Mobile Applications with New Application Security Test PRESS RELEASE TrustInSoft Mathematically Guarantees Zero-Bug Mobile Applications with New Application Security Test Bye, bye Pegasus: the new offer allows mobile app developers to prove the absence of vulnerabilities in C and C++ code, libraries, and APIs Cybersecurity software company […]