Overview: A pioneer in source code analysis, Klocwork® offers a portfolio of software development tools that ensure the security, quality and maintainability of complex code bases.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by Klocwork.
Research offered by Klocwork
3 Must-Follow Guidelines for Mitigating M2M Software Security Risks by Klocwork. December 04, 2013 - Manufacturers of products that allow for Machine-to-Machine (M2M) communications must ensure the safety and security of these devices. This paper outlines three important guidelines that embedded software teams should follow to help protect critical M2M systems against failure and malicious attack.
Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497) by Klocwork. November 08, 2013 - Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Course: Improper Validation of Array Index (CWE-129) by Klocwork. November 13, 2013 - This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Course: Insecure Temporary Files (CWE-377) by Klocwork. November 13, 2013 - This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Embedded Open Source Analysis by Klocwork. April 2008 - This white paper explores the results from an analysis of multiple open source projects that are commonly used in embedded development.
Introducing the Agile Desktop: Achieve high velocity with the Klocwork C/C++ developer's desktop by Klocwork. November 01, 2009 - As Agile is embraced by development organizations everywhere, the need to produce clean, maintainable software quickly is great. To achieve development agility, developers must maintain velocity, eliminate bug debt, and focus on peer interaction. Read this paper to learn how to automate time consuming development activities to boost productivity.
Introduction to Secure Coding for C/C++ by Klocwork. September 19, 2011 - When budgets, customers and reputations are at stake, software developers need every available tool to ensure that applications and code are as secure as possible. Going a step above and beyond, this interactive online learning center provides detailed lessons for securing C/C++ code.
Securing Embedded Software with Threat Modeling by Klocwork. September 02, 2011 - This presentation transcript explains threat modeling for embedded software and how it can be used as part of a strategy for creating more secure embedded software.
Webinar: Catch the Security Breach Before It’s out of Reach by Klocwork. November 18, 2013 - Join the"Catch the Security Breach Before it's Out of Reach" webinar to understand how data breaches can happen in web, desktop and mobile applications. It covers techniques to recognize and assess potential problems in source code, introduce remediation best practices and touch on well-known secure coding standards.