Common Embedded Vulnerabilities, Part 2: Information Leaks (.PDF Download)

Sept. 3, 2015

Following Part 1 of this series on source-code weaknesses, which discussed code injections, this second installment delves into information leaks (some prefer the term information exposure). Information leaks occur when a program inadvertently communicates sensitive information inappropriately...

Register or Sign in below to download the full article in .PDF format, including high resolution graphics and schematics when applicable.

Sponsored

This presentation will provide an overview on proper fan selection, including system profiling, determining a system’s cooling requirements, and an outline of fan types and features...
This video delves into the basics of ultrasonic sensors, including how they work, understanding beam angles, a comparison of strengths and limitations, and more.
In this podcast episode, we interview Joe Pawelczyk, VP of operations at DPI UAV Systems (USA), a leading provider of small rotary wing unmanned aerial vehicles (UAV).
A microcontroller with an integrated energy harvester offers a way to extend battery life and replacement batteries