Common Embedded Vulnerabilities, Part 2: Information Leaks (.PDF Download)

Sept. 3, 2015

Following Part 1 of this series on source-code weaknesses, which discussed code injections, this second installment delves into information leaks (some prefer the term information exposure). Information leaks occur when a program inadvertently communicates sensitive information inappropriately...

Register or Sign in below to download the full article in .PDF format, including high resolution graphics and schematics when applicable.

Sponsored

How sensor fusion is driving vehicle autonomy forward

As ADAS technology extends to critical, time-sensitive applications such as emergency braking, front-collision warning and avoidance, and blind-spot detection combining data...

Do all rails need low Iq?

All designers of ultra-low power systems are concerned about battery life.

Integrated Power Supply Buck Converters

Integrated power supply ICs to implement compact and efficient buck converters for factory automation, 5G and IoT.