See you at BlackHat USA

Navigating the Transition to Memory-Safe Programming Languages for Enhanced Cybersecurity.

Navigating the Transition to Memory Safe Programming Languages for Embedded Cybersecurity

  Back to news How to reduce memory-safety programming language risks. /*! elementor – v3.19.0 – 29-01-2024 */ .elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=”.svg”]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block} /*! elementor – v3.19.0 – 29-01-2024 */ .elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px} Key Points: Memory safety vulnerabilities continue to pose significant threats in the digital landscape, necessitating a shift towards […]

Proving the Security of Low-Level Software Components & TEEs

Graphic: Proving the security of Low-level software components & TEEs

Back to news The role of formal methods in securing low-level software components and TEEs Semiconductors and Their Significance Semiconductors are at the core of many things we see around us: from game consoles, mobile devices, smart meters to automotive vehicles to aircrafts and equipment used in industrial settings and mission critical domains such as […]

How Exhaustive Static Analysis can Prove the Security of TEEs

icon/arrow Back to news TrustInSoft’s new white paper, How Exhaustive Static Analysis Can Prove the Security of TEEs, explains why organizations that rely on trusted execution environments within their devices should adopt this new technology. The Trusted Execution Environment (TEE) within a processor has become a key component for protecting sensitive data and applications from unauthorized access.  To fulfill […]

What is a TEE and what are the challenges of validating one?

Graphic: what is trusted execution environment TEE and what are the challenges of validating one?

  Back to news This post is Part 1 of a 3-part series derived from TrustInSoft’s latest white paper, “How Exhaustive Static Analysis can Prove the Security of TEEs” To obtain a FREE copy, CLICK HERE. Modern consumer technology is increasingly complex, connected, and personalized. Our devices are carrying more and more sensitive data that must be […]

How to protect your code from Pegasus spyware

How can TrustInSoft help prevent Pegasus-like attacks

  Back to news Learn how to stop Pegasus-like attacks and protect your code from buffer overflows and other exploitable vulnerabilities Introduction You may have heard of Pegasus, a surveillance software produced by an Israeli company, the NSO Group, for anti-crime and anti-terrorism purposes. It is back in the news for the alleged spying on 180 journalists […]