Going Beyond Fuzzing for Airtight Security

Fuzzing White Blog Series: Blog 3 Going Beyond Fuzzing for Airtight Security; Even when used with the best analysis tools, fuzzing will not provide perfect code coverage. For your most security-critical applications, you may need to go further.

icon/arrow Back to news Even when used with the best analysis tools, fuzzing will not provide perfect code coverage. For your most security-critical applications, you may need to go further. In Part 1 of this series , we introduced the software verification technique called fuzzing.  We described what it is, who uses it and why, the […]

Optimizing Fuzzing to Eliminate More Vulnerabilities

Graphic Fuzzing Blog 2: Optimizing Fuzzing to Eliminate More Vulnerabilities; Fuzzing has its limitations, formal methods can help you overcome them

icon/arrow Back to news Fuzzing has its limitations. Formal methods can help you overcome them. In the first post of this series , we introduced the software verification technique called fuzzing.  We described what it is, who uses it and why, the tools involved, and the benefits of fuzzing. In this post, we’ll examine the limitations […]

An Introduction to Fuzzing

Graphic Fuzzing Blog 1: An Introduction to Fuzzing, what it is, who uses it and why, its benefits and the tools involved

Back to news What it is, who uses it and why, its benefits and the tools involved? The rapid growth in the connectivity of software-driven products over the last several years is expected to continue for the foreseeable future.[1], [2]  That growth, however, has also increased both the attack surfaces of those products and the […]

TrustInSoft Analyzer Drives Results on the Toyota Infotechnology Center (ITC) Test Suite

Image with text TrustInSoft Drives Results on ITC Test Suite, in the background is a large automotive vehicle.

icon/arrow Back to news Learn more about the benchmark of static analysis tools for the purpose of comparing solutions for automotive safety and security practices & TrustInSoft Analyzer’s results on the ITC test suite Context The Toyota Infotechnology Center (ITC) test suite, created for C/C++ static analysis tools, was designed to quantitatively evaluate industry tools […]

Why low-level code has become the new focal point of cybersecurity for embedded systems

low-level code blog 1- why low-level code has become the new focal point of cybersecurity for embedded systems

icon/arrow Back to news The rapid expansion of connected devices and applications poses cybersecurity threats for embedded systems, download the free white paper to learn about the risks and possible solutions From smartphones to gaming consoles, automobiles to self-service fuel pumps, medical implants to smart-home technologies, the number of connected devices that touch our lives […]

TrustInSoft Enters the Automotive Market with Exhaustive Static Code Analysis Tool For Safety and Cybersecurity Critical Software

Press release TrustInSoft Breaks Into Automotive with eSOL and EasyMile, New Automotive Clients

Back to news Visit TrustInSoft at the Consumer Electronics Show at the French Automotive Pavilion in the Las Vegas Convention Center West Hall, Booth 5400 to learn more and see a demo. /*! elementor – v3.9.0 – 06-12-2022 */ .elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=”.svg”]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block} /*! elementor – v3.9.0 – 06-12-2022 */ .elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading […]