Common Embedded Vulnerabilities, Part 2: Information Leaks (.PDF Download)

Sept. 3, 2015

Following Part 1 of this series on source-code weaknesses, which discussed code injections, this second installment delves into information leaks (some prefer the term information exposure). Information leaks occur when a program inadvertently communicates sensitive information inappropriately...

Register or Sign in below to download the full article in .PDF format, including high resolution graphics and schematics when applicable.

Sponsored

5G is here. Increased speed, capacity, and bandwidth. TE Connectivity has powerful solutions to 5G communications connectivity design obstacles.
Unbox the RP20 Pro High-Gain Antenna—built for powerful 5G and LTE coverage across CBRS and unlicensed bands. With integrated pigtail cables, easy mounting hardware, and broad...
Learn how Single Pair Ethernet (SPE) contributes to sustainability in industrial communication. This on-demand webinar explores how SPE reduces wiring, installation costs, and...
Discover the key differences between an LCR meter and a VNA, and learn when to use each tool for optimal results. This episode demystifies these complex instruments with straightforward...