How exhaustive static analysis can slash software verification costs and schedule for developers of safety and cybersecurity critical systems
icon/arrow Back to news Why industries like aerospace and nuclear energy generation are moving away from traditional software testing and toward exhaustive static analysis Introduction In the first post of this series , we discussed why software for safety-critical systems is hitting an “affordability wall,” why reliance on wireless connectivity in those systems is exacerbating the […]
Why safety-critical software is hitting the “affordability wall” and how system developers can cut its cost dramatically
Back to news This post is Part 1 of a 3-part series derived from TrustInSoft’s latest white paper, “Delivering Safety-Critical Software Faster and Cheaper: How Exhaustive Static Analysis Guarantees Correctness and Security while Reducing Cost and Schedule.” To obtain a FREE copy, CLICK HERE. Introduction In this series of three blog articles, we will start […]
C programs that access the representation of addresses: TrustInSoft’s solution
icon/arrow Back to news Where examples listed in a previous post become analyzable Written by Pascal Cuoq Foreword for the present sequel post A previous blog post showed a number of difficulties that can arise when analyzing low-level C code, specifically the kind of C code that accesses the representation of addresses. It also claimed that, in a serendipitous fashion, […]
Proving the Security of Low-Level Software Components & TEEs
Back to news The role of formal methods in securing low-level software components and TEEs Semiconductors and Their Significance Semiconductors are at the core of many things we see around us: from game consoles, mobile devices, smart meters to automotive vehicles to aircrafts and equipment used in industrial settings and mission critical domains such as […]
Static analysis and low-level C programs that access the representation of addresses
Back to news A collection of seemly disparate problems identified over the life of TrustInSoft Analyzer, to which a common solution emerged recently. Written by Pascal Cuoq Introduction It is sometimes easier to see how things can work out in hindsight than when you are in the moment. I had only recently arrived at my […]
How Exhaustive Static Analysis Will Make Next-Generation Automotive Software Safer, More Reliable, and More Secure
icon/arrow Back to news This post is Part 3 of a 3-part series derived from TrustInSoft’s latest white paper, “On the Road to Zero-Bug Vehicles by 2030.” To obtain a FREE copy, click here. Software will drive the automotive industry for years to come. In Part 1 of this series, we looked at the key, […]
Five Major Software Challenges the Automotive Industry Must Conquer by 2030
icon/arrow Back to news This post is Part 2 of a 3-part series derived from TrustInSoft’s latest white paper, “On the Road to Zero-Bug Vehicles.” To obtain a FREE copy, click here. Introduction Software is set to drive the automotive industry for years to come. In our previous post, we looked at the key, software-driven […]
TrustInSoft Unveils New Offer for Zero Vulnerability Software at the Mobile World Congress 2022
Back to news Here’s a recap from TrustInSoft at the MWC 2022! TrustInSoft at the Mobile World Congress That’s a wrap! TrustInSoft exhibited at the 2022 edition of the Mobile World Congress last week in Barcelona. It was the perfect time to unveil TrustInSoft’s latest product offering for zero-vulnerability software: an application security testing […]
Software Trends, Risks, and Potential Rewards that Will Drive the Automotive Industry Over the Next Ten Years
Back to news This post is Part 1 of a 3-part series derived from TrustInSoft’s latest white paper, “On the Road to Zero-Bug Vehicles” To obtain a FREE copy, click here. Introduction Software is rapidly transforming the automotive industry. Over the next 10 years, expansion of the software and electrical/electronics market in the sector is […]
Why Exhaustive Static Analysis is the key to validating a secure and reliable Trusted Execution Environment
Back to news This post is Part 3 of a 3-part series derived from TrustInSoft’s latest white paper, “How Exhaustive Static Analysis Can Prove the Security of Trusted Execution Environments.” To obtain a FREE copy, CLICK HERE. Introduction In Part 1 of this series, we discussed why the code of a trusted execution environment (TEE) needs to be completely free of […]