TrustInSoft Showcases New Offer for Zero-Vulnerability Devices at Mobile World Congress 2022

Back to news Zero-vulnerability software takes center stage at the Mobile World Congress in light of ever-present cyberattacks PRESS RELEASE BARCELONA, Feb. 28th, 2022 – TrustInSoft, a cybersecurity software company, is showcasing its latest offer for zero-vulnerability devices at the Mobile World Congress (MWC), the premier mobile communications trade show taking place from February 28th […]

Bye, bye Pegasus – New Application Security Test

Graphic: bye bye project pegasus zero bug mobile application security test

  Back to news TrustInSoft Mathematically Guarantees Zero-Bug Mobile Applications with New Application Security Test PRESS RELEASE TrustInSoft Mathematically Guarantees Zero-Bug Mobile Applications with New Application Security Test Bye, bye Pegasus: the new offer allows mobile app developers to prove the absence of vulnerabilities in C and C++ code, libraries, and APIs Cybersecurity software company […]

Mitsubishi Electric R&D Centre Europe creates reliable innovation with TrustInSoft

Graphic: Mitsubishi electric creating reliable innovation with TrustInSoft

  Back to news Mitsubishi Electric R&D Centre Europe faced the challenge of confirming the safety and reliability of more than 300,000 lines of code Who is Mitsubishi Electric R&D Centre Europe (MERCE)? A key component of Europe’s leading R&D community, Mitsubishi Electric R&D Centre Europe (MERCE) researches and develops innovative solutions relating to energy, […]

Beyond the x86_64: developing for embedded systems without development boards

icon/arrow Back to news Challenges of Cross-Platform Development and Solutions  Introduction In embedded software development, one of the first decisions made even before application development is the choice of a hardware platform, which due to its respective constraints and capabilities, can define functionalities of the embedded system once development has begun.  To maintain flexibility so […]

What are the software security implications of 5G?

icon/arrow Back to news Interview with telecommunications expert, Theirry Bonhomme  Thierry Bonhomme is a renowned expert in the telecommunications industry, having served for over 30 years at Orange Group including most recently as CEO of their B2B branch until 2018 (Orange Business Services.) He was in charge of the development of the division that provides […]

The Wireshark Challenge: how to ensure the security of open-source projects with formal methods?

TrustInSoft, The Wireshark challenge. Text below: Securing open source software

Back to news Meeting the security challenges arising from open-source projects with powerful analysis Open-source software is a foundational element of our technological world today. WordPress, Linux, OpenSSL, or Nginx are just some examples of widely-used open-source programs. The large community of developers regularly contributes to the functionalities and security of these programs, libraries, or […]

GCC always assumes aligned pointer accesses

Image: Computer

Back to news Leading to consequences of unexpected program behaviour TL;DR This post shows that modern optimizing C compilers assume that the source code they are compiling respects memory alignment constraints, even if the target architecture imposes no such restriction. This can lead to compiled programs not behaving as the programmer intended. C: The Language […]

TrustInSoft raises €5M to push into the self-driving car and IoT markets

Graphic: News

Back to news Through its Brienne III cybersecurity fund –first of it’s kind in France– ACE Management leads this round followed by TrustInSoft’s longstanding shareholders, Idinvest Partners and business angels. PRESS RELEASE   Paris, 4 November 2019 – TrustInSoft, a cybersecurity software publisher whose technology provides software code reliability and security, based on mathematical proof, announces […]