Common Embedded Vulnerabilities, Part 2: Information Leaks (.PDF Download)
Sept. 3, 2015
Following Part 1 of this series on source-code weaknesses, which discussed code injections, this second installment delves into information leaks (some prefer the term information exposure). Information leaks occur when a program inadvertently communicates sensitive information inappropriately...
Register or Sign in below to download the full article in .PDF format, including high resolution graphics and schematics when applicable.