Common Embedded Vulnerabilities, Part 2: Information Leaks (.PDF Download)

Sept. 3, 2015

Following Part 1 of this series on source-code weaknesses, which discussed code injections, this second installment delves into information leaks (some prefer the term information exposure). Information leaks occur when a program inadvertently communicates sensitive information inappropriately...

Register or Sign in below to download the full article in .PDF format, including high resolution graphics and schematics when applicable.

Sponsored

The flyback topology is a versatile, widely used, switched-mode power-supply design with some interesting characteristics that brings performance and BOM advantages to many applications...
Stricter guidelines imposed by version 3 of the IEC standard for harmonic current emissions push designers to embrace power-factor-correction methodologies.
High output current, also referred to as Iout, might be an important spec for your low-dropout (LDO) linear regulator.
Designing power supplies that work from wall outlets has multiple challenges. This FAQ should answer many of your questions.