Common Embedded Vulnerabilities, Part 2: Information Leaks (.PDF Download)

Sept. 3, 2015

Following Part 1 of this series on source-code weaknesses, which discussed code injections, this second installment delves into information leaks (some prefer the term information exposure). Information leaks occur when a program inadvertently communicates sensitive information inappropriately...

Register or Sign in below to download the full article in .PDF format, including high resolution graphics and schematics when applicable.

Sponsored

The Basics of Current Sensors

This article describes the advantages of open-loop sensors over closed-loop current sensors. Examples of LEM and Honeywell open-loop sensors are described.

Power Topologies Handbook

Buy ICs, tools & software directly from TI. Request samples, enjoy faster checkout, manage orders online and more with your myTI account.

A Designer's Guide to Lithium (Li-ion) Battery Charging

This designer's guide helps you discover how you can safely and rapidly charge lithium (LI-ion) batteries to 20%-70% capacity in about 20-30 minutes.

Smart Wireless Wall Clock with ForgeFPGA

Compact, low-cost clock design with a smooth transition of digits and automatic brightness adjustment.