Safety & Security

Standards, regulations, and techniques for implementing safe and secure systems.

image

Using the Elliptic Curve Digital Signature Algorithm effectively

How the Elliptic Curve Digital Signature Algorithm (ECDSA) can be used to simplify management and protection of secret keys. Read More

image

Using static analysis to make open source Web applications more secure

A case study in how static analysis can be used to find and eliminate coding errors in three popular safety critical open source applications – Read More

image

Adding M2M security to RTOS-enabled MCUs, MPUs or FPGAs

A brief tutorial on adding security to any connected embedded design using machine-to-machine (M2M) connectivity protocols. Read More

image

Building more secure embedded software with code coverage analysis

The authors discuss how the use of code coverage techniques can improve the reliability and security of embedded software without necessarily Read More

image

Building a secure embedded development process

David and Mike Kleidermacher describe a much ignored aspect of developing secure software: the underlying software development process and tools that Read More

image

Adopting aerospace development and verification standards: Part 2 – Source/object code verification

The second in a two-part series on the adoption of the avionics industry’s comprehensive certification and verification process by other embedded Read More

image

Static vs. dynamic analysis for secure code development: Part 2

The strengths and weaknesses of dynamic code analysis in the development of secure C or C++ code.  Read More

image

Static vs. dynamic analysis for secure code development: Part 1

The strengths and weaknesses of static and dynamic code analysis in the development of secure C or C++ code. Read More

image

Using coding standards to improve software quality and security

In an excerpt from their book Embedded System Security, the authors assess the role of C and C++ coding standards and how compliance leads to more Read More

image

Building an SHA-256 master/slave authentication system

For more than 10 years, SHA-1 authentication has been used to effectively protect intellectual property from counterfeiting and illegal copying. Now Read More

image

Building a secure embedded development process

A much neglected aspect of developing secure embedded software is the underlying software development process, the tools it is based on and how they Read More

image

Enhancing system efficiency of embedded encryption applications

How to efficiently implement encryption algorithms using an SoC with programmable logic work that works with an MCU core. Read More

image

High assurance software engineering improves embedded design security

An introduction to a set of principles of high assurance software engineering (PHASE) for securing embedded systems. Read More

image

Developing secure code using SPARK: Part 2 – How to use it

Part 2 in a series on embedded software security, the potential of language subsetting and how the SPARK language subset of ADA addresses these Read More

image

Developing secure code using SPARK – Part 1

A two part article on embedded software security, the potential of language subsetting and how the SPARK language subset of ADA addresses these Read More

image

Intellectual property security: A challenge for embedded systems developers

In this Product How-To article, Sachin Gupta describes how an embedded design’s IP can be accessed and protected, using Cypress PSoC 1 devices as Read More

prev

1 of 16

next
see all Safety & Security

Insights view all

  • Currently no items

Collections
Tech Papers
Webinars
Courses

3 Must-Follow Guidelines for Mitigating M2M Software Security Risks

Save & Follow 01 November 2013

This white paper discusses 3 guidelines... Read More

see all

Most Commented

  • Currently no items

Parts Search Datasheets.com

KNOWLEDGE CENTER