Why exhaustive static analysis is ideally suited for ensuring the security of low-level code

icon/arrow Back to news Read more in the free white paper: From Bare Metal to Kernel Code: How Exhaustive Static Analysis Can Guarantee Airtight Security in Low-level Software and Firmware and discover two practical use cases In Part 1 of this series, we discussed why ensuring the security of low-level code—the code used in OS kernels, device […]
Proving the Security of Low-Level Software Components & TEEs

Back to news The role of formal methods in securing low-level software components and TEEs Semiconductors and Their Significance Semiconductors are at the core of many things we see around us: from game consoles, mobile devices, smart meters to automotive vehicles to aircrafts and equipment used in industrial settings and mission critical domains such as […]
How Exhaustive Static Analysis can Prove the Security of TEEs

Back to news TrustInSoft’s new white paper, How Exhaustive Static Analysis Can Prove the Security of TEEs, explains why organizations that rely on trusted execution environments within their devices should adopt this new technology. The Trusted Execution Environment (TEE) within a processor has become a key component for protecting sensitive data and applications from unauthorized access. To fulfill […]
Why Exhaustive Static Analysis is the key to validating a secure and reliable Trusted Execution Environment

Back to news This post is Part 3 of a 3-part series derived from TrustInSoft’s latest white paper, “How Exhaustive Static Analysis Can Prove the Security of Trusted Execution Environments.” To obtain a FREE copy, CLICK HERE. Introduction In Part 1 of this series, we discussed why the code of a trusted execution environment (TEE) needs to be completely free of […]
Why developers need to move beyond software testing to validate a trusted execution environment

Back to news This post is Part 2 of a 3-part series derived from TrustInSoft’s latest white paper, “How Exhaustive Static Analysis can Prove the Security of TEEs” To obtain a FREE copy, CLICK HERE. In the first post of this series, we discussed why the code of a trusted execution environment (TEE) needs to be completely free of undefined […]
What is a TEE and what are the challenges of validating one?

Back to news This post is Part 1 of a 3-part series derived from TrustInSoft’s latest white paper, “How Exhaustive Static Analysis can Prove the Security of TEEs” To obtain a FREE copy, CLICK HERE. Modern consumer technology is increasingly complex, connected, and personalized. Our devices are carrying more and more sensitive data that must be […]
How to protect your code from Pegasus spyware

Back to news Learn how to stop Pegasus-like attacks and protect your code from buffer overflows and other exploitable vulnerabilities Introduction You may have heard of Pegasus, a surveillance software produced by an Israeli company, the NSO Group, for anti-crime and anti-terrorism purposes. It is back in the news for the alleged spying on 180 journalists […]