Threat modeling for secure embedded software

As embedded software becomes more mobile and connected, organizations must take additional steps to ensure their code is secure.

To lockdown code and combat ever-changing security threats, software engineering teams need to incorporate threat modeling, combined with updated tools and processes into their development plans. This paper examines threat modeling and explains how it can be used in concert with defensive coding, automated source code analysis, peer code review, and penetration testing to both identify and mitigate embedded software threats.

Posted: 9/18/2014
Tags: embedded programming, software security, source code analysis, static analysis

Download Resource