Securing Embedded Software with Threat Modeling

Securing Embedded Software with Threat Modeling

Cover

This presentation transcript explains threat modeling for embedded software and how it can be used as part of a strategy for creating more secure embedded software.

It covers software risks as they apply to embedded software, how to go about threat modeling activity and how the process can lead to defensive coding, and how it can be used to improve code review processing and penetration testing.

Vendor:
Klocwork
Posted:
02 Sep 2011
Published:
02 Sep 2011
Format:
PDF
Length:
15 Page(s)
Type:
Presentation Transcript
Language:
English
Already a Bitpipe member? Login here

Download this Presentation Transcript!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor