Common Embedded Vulnerabilities, Part 2: Information Leaks (.PDF Download)

Sept. 3, 2015

Following Part 1 of this series on source-code weaknesses, which discussed code injections, this second installment delves into information leaks (some prefer the term information exposure). Information leaks occur when a program inadvertently communicates sensitive information inappropriately...

Register or Sign in below to download the full article in .PDF format, including high resolution graphics and schematics when applicable.

Sponsored

Integrated Power Supply Buck Converters

Integrated power supply ICs to implement compact and efficient buck converters for factory automation, 5G and IoT.

A Designer's Guide to Lithium (Li-ion) Battery Charging

This designer's guide helps you discover how you can safely and rapidly charge lithium (LI-ion) batteries to 20%-70% capacity in about 20-30 minutes.

Get Started with USB-C Power Delivery

Integrating USB Type-C connectors into designs requires developers pay careful attention to proper connector options and recommended layout guidelines.

Automotive 1200-V, 50-mA, isolated switch with 2-mA avalanche rating

The TPSI2140-Q1 is an isolated solid state relay designed for high voltage automotive and industrial applications.