Addressing Security Vulnerabilities in Embedded Applications Using Best Practice Software Development Processes and Standards

An introduction to applying CWE coding guidelines and achieving CERT security compliance using static analysis tools

Mission Critical Embedded Systems Are Vulnerable To Attack and Exploitation

Every day we read about cyber attacks perpetrated against individuals, corporations, or governments. The reasons are varied - competitive, political, military, or economic - but the headlines keep coming. And from attacks like Stuxnet and Duqu, as well as high profile automotive hacks, we’ve come to understand that embedded systems are not immune. In fact, attacks against embedded systems could lead to wide-scale damage to critical infrastructure, including power generation, oil and gas refining, telecommunications, transportation, and water and waste control systems.

Manufacturers must adopt security best practices and standards to remain competitive 
jw4_thumb.png

What you'll learn:

Many embedded systems and "connected” IoT products lack proper security due to outdated software development practices. Organizations now know they need to incorporate security into the software SDLC, yet many lack security expertise and are struggling with how to implement best practices. 

Gain a better understanding of:

  • Why it's so difficult to produce secure software
  • Secure development guidelines and resources
  • Identifying and preventing known vulnerabilities
  • Leveraging the Common Weakness Enumeration database
  • CERT Coding standards for embedded developers
  • How Static Analysis finds source code defects and vulnerabilities and measures source code compliance
  • How to deliver more secure software faster 

Security is everyone's responsibility, so whether your role encompasses Security, Quality Assurance, Development or Management you should read this paper

Addressing Security Vulnerabilities in Embedded Applications Using Best Practice

Don't Wait! 
Take a few minutes Grab a coffee
Learn how to develop more secure code