> View this now
Published on: July 25, 2012
Type of content: WHITE PAPER
Length: 3 pages
Did you know that almost half of all critical security leaks in embedded software are due to heap overflows? Additionally, buffer overflows – although making up significantly smaller numbers of attacks than heap overflows – can be exploited in the same way to insert unauthorized code.
In this white paper, learn how to use quality software development and code testing to identify and fix errors and security vulnerabilities in embedded software instead of policing each individual attack. Examine sample illustrations of a stack, how to analyze it, test it, and identify anything that doesn’t look normal.