Securing Embedded Software with Threat Modeling

Securing Embedded Software with Threat Modeling

Cover

This presentation transcript explains threat modeling for embedded software and how it can be used as part of a strategy for creating more secure embedded software.

It covers software risks as they apply to embedded software, how to go about threat modeling activity and how the process can lead to defensive coding, and how it can be used to improve code review processing and penetration testing.

Vendor:
Klocwork
Posted:
Sep 2, 2011
Published:
Sep 2, 2011
Format:
PDF
Type:
Presentation Transcript
Already a Bitpipe member? Log in here

Download this Presentation Transcript!