Common Embedded Vulnerabilities, Part 2: Information Leaks (.PDF Download)

Sept. 3, 2015

Following Part 1 of this series on source-code weaknesses, which discussed code injections, this second installment delves into information leaks (some prefer the term information exposure). Information leaks occur when a program inadvertently communicates sensitive information inappropriately...

Register or Sign in below to download the full article in .PDF format, including high resolution graphics and schematics when applicable.

Sponsored

Choosing Inductors for Energy Efficient Power Applications

In high frequency DC-DC converters, inductors filter out the AC ripple current superimposed on the DC output.

The Importance of PCB Design in Consumer Products

Explore the importance of PCB design and how Fusion 360 can help your team react to evolving consumer demands.

UCC33420-Q1: Automotive, 5V/5V 1.5W 3kVrms isolated DC-DC module with integrated transformer

TI’s UCC33420-Q1 is a Automotive, 5V/5V 1.5W 3kVrms isolated DC-DC module with integrated transformer. Find parameters, ordering and quality information

DC-DC Converter Design Made Easy

Delve into voltage regulators and DC-DC power supplies