Common Embedded Vulnerabilities, Part 2: Information Leaks (.PDF Download)

Sept. 3, 2015

Following Part 1 of this series on source-code weaknesses, which discussed code injections, this second installment delves into information leaks (some prefer the term information exposure). Information leaks occur when a program inadvertently communicates sensitive information inappropriately...

Register or Sign in below to download the full article in .PDF format, including high resolution graphics and schematics when applicable.

Sponsored

This webcast will focus on design of RF front-end circuitry including RF PAs and LNAs, Tunable Filter, Attenuators, External LO and Power Management that are required to complete...
Browse TE Connectivity sensors by type. Pressure, Temperature, Force, Humidity, Motion and Position sensors available at DigiKey.
Discover how Analog Devices enables modular robotic systems using sensor fusion, 3D vision, and 60GHz wireless for applications in HMI, safety, and gripper control in flexible...
Wire caps may be small, but they’re essential for safe and reliable electrical connections. This blog breaks down what they are, why they matter, and how TE’s trusted solutions...