Developing secure embedded software - quality doesn’t equal security

Many organizations are only now becoming aware of the need to incorporate security into their software development lifecycle. Raising awareness of common pitfalls is the first step to avoid falling prey to them, but awareness by itself is insufficient. Effectively addressing embedded software security requires a combination of people, process, and technology.  No single tool, technique, or process will ever provide a complete solution. This paper explains why some commonly used approaches to security typically fail and outlines a development strategy for getting security right.

 

 


 


Related


Embedded Software for Safety Critical Applications

Production code generation with Model-Based Design has replaced document-based development and manual coding in various domains in automotive, industrial automation, aerospace and medical. Safety-rela...

Coding safe and secure applications

The debate about safety and security concerns in high integrity software applications is a hot topic of discussion in modern software management. The need to address these concerns is present in e...

Best practices for static analysis tools

This paper reviews a number of the growing complexities that embedded software development teams are facing, including the proliferation of third-party code, increased pressures to develop secure ...


Making things come alive in a secure way

Considering the security of one single business application is not enough anymore. With the IoT, multiple applications across multiple industries can share and exchange data across different types...

Monitoring and Securing the Smart Grid

Smart grids use phasor measurement units (PMUs) to assess and manage independently operated grid systems. National Instruments, Hewlett Packard Enterprise, and OSIsoft created a "best of bree...

Monetizing the IoT: Show Me the Money

The Internet of Things (IoT) is disrupting entire industries around the world. There is a lot of ‘new’ –including new devices, software, services – along with new opportunities...