Proving the Security of Low-Level Software Components & TEEs

icon/arrow Back to news The role of formal methods in securing low-level software components and TEEs Semiconductors and Their Significance Semiconductors are at the core of many things we see around us: from game consoles, mobile devices, smart meters to automotive vehicles to aircrafts and equipment used in industrial settings and mission critical domains such […]

How Exhaustive Static Analysis can Prove the Security of TEEs

icon/arrow Back to news TrustInSoft’s new white paper, How Exhaustive Static Analysis Can Prove the Security of TEEs, explains why organizations that rely on trusted execution environments within their devices should adopt this new technology. The Trusted Execution Environment (TEE) within a processor has become a key component for protecting sensitive data and applications from unauthorized access.  To fulfill […]

TrustInSoft Showcases New Offer for Zero-Vulnerability Devices at Mobile World Congress 2022

icon/arrow Back to news Zero-vulnerability software takes center stage at the Mobile World Congress in light of ever-present cyberattacks PRESS RELEASE BARCELONA, Feb. 28th, 2022 – TrustInSoft, a cybersecurity software company, is showcasing its latest offer for zero-vulnerability devices at the Mobile World Congress (MWC), the premier mobile communications trade show taking place from February […]

TrustInSoft’s Exhaustive Static Analysis Proves the Security of Trusted Execution Environments

icon/arrow Back to news Download New TrustInSoft White Paper and Learn How to Guarantee Devices are Error-free, Secure and Reliable Paris and San Francisco – November 9, 2021 PRESS RELEASE TrustInSoft’s Exhaustive Static Analysis Proves the Security of Trusted Execution Environments Download New TrustInSoft White Paper and Learn How to Guarantee Devices are Error-free, Secure […]

Bye, bye Pegasus – New Application Security Test

icon/arrow Back to news TrustInSoft Mathematically Guarantees Zero-Bug Mobile Applications with New Application Security Test PRESS RELEASE TrustInSoft Mathematically Guarantees Zero-Bug Mobile Applications with New Application Security Test Bye, bye Pegasus: the new offer allows mobile app developers to prove the absence of vulnerabilities in C and C++ code, libraries, and APIs Cybersecurity software company […]

Mitsubishi Electric R&D Centre Europe creates reliable innovation with TrustInSoft

icon/arrow Back to news Mitsubishi Electric R&D Centre Europe faced the challenge of confirming the safety and reliability of more than 300,000 lines of code Who is Mitsubishi Electric R&D Centre Europe (MERCE)? A key component of Europe’s leading R&D community, Mitsubishi Electric R&D Centre Europe (MERCE) researches and develops innovative solutions relating to energy, […]

Beyond the x86_64: developing for embedded systems without development boards

icon/arrow Back to news Challenges of Cross-Platform Development and Solutions  Introduction In embedded software development, one of the first decisions made even before application development is the choice of a hardware platform, which due to its respective constraints and capabilities, can define functionalities of the embedded system once development has begun.  To maintain flexibility so […]

What are the software security implications of 5G?

Back to news Interview with telecommunications expert, Theirry Bonhomme Thierry Bonhomme is a renowned expert in the telecommunications industry, having served for over 30 years at Orange Group including most recently as CEO of their B2B branch until 2018 (Orange Business Services.) He was in charge of the development of the division that provides telecommunications […]

The Wireshark Challenge: how to ensure the security of open-source projects with formal methods?

icon/arrow Back to news Meeting the security challenges arising from open-source projects with powerful analysis Open-source software is a foundational element of our technological world today. WordPress, Linux, OpenSSL, or Nginx are just some examples of widely-used open-source programs. The large community of developers regularly contributes to the functionalities and security of these programs, libraries, […]