Common Embedded Vulnerabilities, Part 2: Information Leaks (.PDF Download)
Sept. 3, 2015
Following Part 1 of this series on source-code weaknesses, which discussed code injections, this second installment delves into information leaks (some prefer the term information exposure). Information leaks occur when a program inadvertently communicates sensitive information inappropriately...
Register or Sign in below to download the full article in .PDF format, including high resolution graphics and schematics when applicable.
Sponsored Recommendations
Sponsored Recommendations