Addressing Security Vulnerabilities in Embedded Applications Using Best Practice Software Development Processes and Standards

Every day we read about cyber attacks perpetrated against individuals, corporations, or governments. In fact, attacks against systems could lead to wide-scale damage to critical infrastructure, including power generation, oil and gas refining, telecommunications, transportation, and water and waste control systems. With today’s increasingly large and complex bases, software developers cannot rely on manual inspection and code review alone. Automated enables organizations to cut costs and speed by enforcing coding standards, streamlining code reviews, and improving overall system before a product is released. This white paper offers an introduction to applying coding guidelines and achieving security compliance using analysis tool.

Topics covered in this article