Common Embedded Vulnerabilities, Part 2: Information Leaks (.PDF Download)

Sept. 3, 2015

Following Part 1 of this series on source-code weaknesses, which discussed code injections, this second installment delves into information leaks (some prefer the term information exposure). Information leaks occur when a program inadvertently communicates sensitive information inappropriately...

Register or Sign in below to download the full article in .PDF format, including high resolution graphics and schematics when applicable.

Sponsored

What is a Field Effect Transistor (FET)?

Ever wonder what a Field Effect Transistor (FET) is? Give this article a read for everything you need to know about the device.

Everything You Need to Know About Capacitors

Learn everything you need to know about capacitors, including capacitance, measuring electrical charge, and the different types of caps.

EMI for Engineers

An overview of EMI management and mitigation techniques for DC/DC regulators

Mastering PCB Layout Design for Cutting-Edge Bluetooth and Wi-Fi Enabled Products

Lets look at the basics of PCB design for wireless technologies, best practices, and challenges when creating wireless products.