C programs that access the representation of addresses: TrustInSoft’s solution

Back to news Where examples listed in a previous post become analyzable Written by Pascal Cuoq Foreword for the present sequel post A previous blog post showed a number of difficulties that can arise when analyzing low-level C code, specifically the kind of C code that accesses the representation of addresses. It also claimed that, in a serendipitous fashion, a […]
Proving the Security of Low-Level Software Components & TEEs

icon/arrow Back to news The role of formal methods in securing low-level software components and TEEs Semiconductors and Their Significance Semiconductors are at the core of many things we see around us: from game consoles, mobile devices, smart meters to automotive vehicles to aircrafts and equipment used in industrial settings and mission critical domains such […]
Static analysis and low-level C programs that access the representation of addresses

icon/arrow Back to news A collection of seemly disparate problems identified over the life of TrustInSoft Analyzer, to which a common solution emerged recently. Written by Pascal Cuoq Introduction It is sometimes easier to see how things can work out in hindsight than when you are in the moment. I had only recently arrived […]
How Exhaustive Static Analysis Will Make Next-Generation Automotive Software Safer, More Reliable, and More Secure

icon/arrow Back to news This post is Part 3 of a 3-part series derived from TrustInSoft’s latest white paper, “On the Road to Zero-Bug Vehicles by 2030.” To obtain a FREE copy, click here. Software will drive the automotive industry for years to come. In Part 1 of this series, we looked at the key, […]
Five Major Software Challenges the Automotive Industry Must Conquer by 2030

icon/arrow Back to news This post is Part 2 of a 3-part series derived from TrustInSoft’s latest white paper, “On the Road to Zero-Bug Vehicles.” To obtain a FREE copy, click here. Introduction Software is set to drive the automotive industry for years to come. In our previous post, we looked at the key, software-driven […]
TrustInSoft Unveils New Offer for Zero Vulnerability Software at the Mobile World Congress 2022

icon/arrow Back to news Here’s a recap from TrustInSoft at the MWC 2022! TrustInSoft at the Mobile World Congress That’s a wrap! TrustInSoft exhibited at the 2022 edition of the Mobile World Congress last week in Barcelona. It was the perfect time to unveil TrustInSoft’s latest product offering for zero-vulnerability software: an application security testing […]
Software Trends, Risks, and Potential Rewards that Will Drive the Automotive Industry Over the Next Ten Years

icon/arrow Back to news This post is Part 1 of a 3-part series derived from TrustInSoft’s latest white paper, “On the Road to Zero-Bug Vehicles” To obtain a FREE copy, click here. Introduction Software is rapidly transforming the automotive industry. Over the next 10 years, expansion of the software and electrical/electronics market in the sector […]
Why Exhaustive Static Analysis is the key to validating a secure and reliable Trusted Execution Environment

icon/arrow Back to news This post is Part 3 of a 3-part series derived from TrustInSoft’s latest white paper, “How Exhaustive Static Analysis Can Prove the Security of Trusted Execution Environments.” To obtain a FREE copy, CLICK HERE. Introduction In Part 1 of this series, we discussed why the code of a trusted execution environment (TEE) needs to be completely free […]
Why developers need to move beyond software testing to validate a trusted execution environment

icon/arrow Back to news This post is Part 2 of a 3-part series derived from TrustInSoft’s latest white paper, “How Exhaustive Static Analysis can Prove the Security of TEEs” To obtain a FREE copy, CLICK HERE. In the first post of this series, we discussed why the code of a trusted execution environment (TEE) needs to be completely free of undefined […]
What is a TEE and what are the challenges of validating one?

icon/arrow Back to news This post is Part 1 of a 3-part series derived from TrustInSoft’s latest white paper, “How Exhaustive Static Analysis can Prove the Security of TEEs” To obtain a FREE copy, CLICK HERE. Modern consumer technology is increasingly complex, connected, and personalized. Our devices are carrying more and more sensitive data that must be […]