C programs that access the representation of addresses: TrustInSoft’s solution

Back to news Where examples listed in a previous post become analyzable Written by Pascal Cuoq Foreword for the present sequel post A previous blog post showed a number of difficulties that ​can arise when analyzing low-level C code, specifically the kind of C code that accesses the representation of addresses. It also claimed that, in a serendipitous fashion, a […]

Proving the Security of Low-Level Software Components & TEEs

icon/arrow Back to news The role of formal methods in securing low-level software components and TEEs Semiconductors and Their Significance Semiconductors are at the core of many things we see around us: from game consoles, mobile devices, smart meters to automotive vehicles to aircrafts and equipment used in industrial settings and mission critical domains such […]

Five Major Software Challenges the Automotive Industry Must Conquer by 2030

icon/arrow Back to news This post is Part 2 of a 3-part series derived from TrustInSoft’s latest white paper, “On the Road to Zero-Bug Vehicles.” To obtain a FREE copy, click here. Introduction Software is set to drive the automotive industry for years to come. In our previous post, we looked at the key, software-driven […]

What is a TEE and what are the challenges of validating one?

icon/arrow Back to news This post is Part 1 of a 3-part series derived from TrustInSoft’s latest white paper, “How Exhaustive Static Analysis can Prove the Security of TEEs” To obtain a FREE copy, CLICK HERE. Modern consumer technology is increasingly complex, connected, and personalized. Our devices are carrying more and more sensitive data that must be […]