Common Embedded Vulnerabilities, Part 2: Information Leaks (.PDF Download)

Sept. 3, 2015

Following Part 1 of this series on source-code weaknesses, which discussed code injections, this second installment delves into information leaks (some prefer the term information exposure). Information leaks occur when a program inadvertently communicates sensitive information inappropriately...

Register or Sign in below to download the full article in .PDF format, including high resolution graphics and schematics when applicable.

Sponsored

A microcontroller with an integrated energy harvester offers a way to extend battery life and replacement batteries
Integrated power supply ICs to implement compact and efficient buck converters for factory automation, 5G and IoT.
Learn how integrated voltage sensing solutions support a more efficient and affordable way of measuring battery life to increase driving range and charge time.
Transformers are widely used to efficiently transfer both power and data in switching power supplies, MOSFET gate drivers, and isolation circuits.