White Papers

Read our white papers to find useful information about software development in the IoT era, where devices must not only function with impeccable quality and safety but also remain resilient to cyber-attacks.

  • Using a SBOM to Make Better Software Security Decisions

    Software supply chain attacks are on the rise. Many of the high-profile cybersecurity news stories such the SolarWinds attack and the Apache Log4j vulnerability tell a tale of attackers exploiting vulnerabilities and weaknesses in the software supply chain. The mode of operation can range from fairly simple exploits of known vulnerabilities like Log4Shell to very sophisticated attacks,…

    Read More
  • Managing Software Supply Chain Risk in Medical Devices

    Modern medical devices are gaining complexity, and as connectivity to the internet, cloud, and outside world increases, so does the security challenge. Further, medical devices for home use are increasing exponentially, so devices must withstand a non-clinical environment while communicating on insecure home networks. And with medical devices, security risks are also safety risks, which increases development costs and liability. To address…

    Read More
  • How to Avoid Common Pitfalls in MISRA Compliance

    BACKGROUND In embedded development, C remains an extremely popular choice of language. Although other languages, such as Ada, C++, and Java are used in some circumstances, and model-driven development is becoming more popular in specific domains, about 50% of the code running on embedded systems is still hand-written C. C is a great language in…

    Read More
  • Exida – Improving Software Security & Comply with IEC 62443

    Using CodeSecure CodeSentry and CodeSonar. download pdf 1 Purpose and Scope In order to develop secure code free of vulnerabilities, suppliers are increasingly following a secure development lifecycle to achieve these goals. The IEC 62443-4-1 standard (Security for industrial automation and control systems –Part 4-1: Secure product development lifecycle requirements) defines specific requirements for using…

    Read More
  • Detecting Domain-Specific Coding Errors with Static Analysis

    INTRODUCTION Static analysis is a term that describes techniques that compute run-time properties of programs, without actually executing them. Static analysis tools are typically used to find program defects. The first generation of static-analysis tools, exemplified by the lint family of tools, had limited capability and were only capable of finding superficial defects. The latest…

    Read More
  • Designing Security into Medical Device Software

    download pdf BACKGROUND Considerable effort in the development of medical devices is focused on safety and reducing patient risk. Even so, with the recently increased connectivity of devices, security researchers have found security lacking in medical devices, with one recent example finding over 1400 security vulnerabilities in a commonly-used infusion pump. As a reaction to…

    Read More
  • Conquering Complex Java Concurrency Bugs with CodeSonar

    download pdf INTRODUCTION Multicore processors have opened the door to new levels of performance in embedded applications. To unlock multicore’s full performance potential, advanced programming techniques such as concurrency and parallel computing are necessary. Applications must be designed so that individual portions of a program can be run in parallel on the various processor cores.…

    Read More
  • Advanced Static Analysis for C/C++

    download pdf INTRODUCTION Static analysis tools have been around for decades and have helped many customers improve the quality of their code by finding programming problems. There have been tremendous developments in the capabilities of static analysis tools, becoming more sophisticated compared to older commercial and open source offerings. The latest generation of advanced static…

    Read More
  • Addressing IoT’s Impact on Software Engineering

    Powered by the forces of the cloud, connected endpoints, wireless technologies, and big data, the Internet of Things (IoT) evolution is forming a “perfect storm” for software engineering teams. This single, transformative force is bigger than anything in the history of tech industry, fueling an unparalleled consumer-oriented features race, expected to advance at an incredible…

    Read More
  • Accelerating MISRA Automotive Software Safety Compliance with Static Application Security Testing

    Static application security testing (SAST) solutions are needed to ensure software code quality, security and critical safety and enforce the standard, but not all tools are created equal. Sophisticated SAST solutions that provide support for the complex development process and perform more than simple syntax checking are desired to reduce risk, costs, and time to…

    Read More
  • A Four-Step Guide to Security Assurance for IoT Devices

    download pdf INTRODUCTION Powered by the forces of the cloud, connected endpoints, wireless technologies, and big data, the Internet of Things (IoT) and Machine-to-Machine (M2M) evolutions are forming a “perfect storm” for software engineering teams. Vendors are racing to claim a piece of the predicted 19 trillion dollar IoT market¹, made up of more than 50 billion…

    Read More
  • Integrating Static Application Security Testing (SAST) Tools in DevSecOps

    download pdf INTRODUCTION Software development teams are continually pushed to deliver more complex software systems, including cyber-physical systems, in a shorter time with fewer resources. At the same time, the cost of failure is increasing as software is often integrated into larger, more complex business chains such as in the case of IoT edge-to-cloud chains,…

    Read More
  • The Role of Static Analysis in Management of Cyber Security in Medical Devices

    download pdf INTRODUCTION The FDA, recognizing the need for more robust security in medical devices, issued its guidance on managing cybersecurity in 2014. The growth of wireless, networked, and Internet-connected devices means that medical devices are more at risk than ever before. In addition, medical devices deal with patient safety and privacy unlike other classes…

    Read More
  • Reduce Automotive Software Failures with Static Analysis

    INTRODUCTION Today’s automobiles run on an astonishing and increasing amount of networked software, much of which powers safety-critical systems. Virtually every aspect of a car is controlled by software, including the throttle, transmission, brakes, speedometer, climate, lights, navigation, and entertainment. With well over 100 million lines of code running on 60 or more interconnected embedded…

    Read More
  • Static Analysis, Railway Safety-Critical Software, and EN 50128

    download pdf STATIC ANALYSIS, RAILWAY SAFETY-CRITICAL Transportation systems (railway systems in particular) are a growing market that increasingly relies on software for command, communication, and control. Due to the impact of errors and accidents in this environment, software is developed to strict standards, including EN 50128. This standard is very specific on the use of…

    Read More
  • Protecting Against Tainted Data in Embedded Apps with Static Analysis

    download pdf INTRODUCTION Attacks against embedded systems are growing in frequency as malicious hackers become more sophisticated in their methods. These vulnerabilities are being exploited by hostile users to gain access to a system so they may subvert its use. These exploits are typically triggered when a hostile user sends data over an input channel.…

    Read More
  • Prevent Cybercrime and Insider Attacks in Your Company with Static Analysis

    download pdf INTRODUCTION The security threat posed by insiders is often underestimated. According to an IBM study, 32% of attackers are insiders and 24% are “inadvertent actors” (e.g. people making mistakes that lead to a system breach or incorrect behavior.) One such class of insider attack is malicious code added during development that allows for…

    Read More
  • A New Era of Software Forensics with Static Analysis

    download pdf The term “forensics” refers to the method of using science to discover evidence of criminal activity. Extending this to software broadens the use case to consider all the purposes of software investigation techniques. Software is ubiquitous and is a part of all mission-critical systems. As such, software failures have tremendous real-world effects. In…

    Read More
  • Measuring the Value of Static Analysis Tool Deployments

    download pdf INTRODUCTION Advanced static-analysis tools are popular because they have proven effective at finding serious programming defects. In contrast to traditional dynamic testing, the code is never executed so there is no need for test cases. This means that static analysis can be applied very early in the development process. When programmers use static…

    Read More
  • Making Safety-Critical Software Development Affordable with Static Analysis

    download pdf BACKGROUND Safety-critical software has hit the “affordability” wall due to increasing complexity and growing reliance on software to perform mission-critical functions (Redman et. al. 2010). Software developer productivity on safety-critical systems hasn’t really changed from 5 lines of code (LOC) a day and roughly 1000 LOC per year (O. Benediktsson 2000). However, with…

    Read More
  • Eliminating Vulnerabilities in Third-Party Code with Binary Analysis

    download pdf BACKGROUND Over the last few years, third-party code has moved from a minor factor in software development to a dominant force in the industry. It is now used throughout software development in all applications, from highly sensitive government and military applications to security-intensive consumer commerce and communications. According to the latest report from…

    Read More
  • Embedded Software Design: Best Practices for Static Analysis Tools

    download pdf INTRODUCTION This paper reviews a number of the growing complexities that embedded software development teams are facing, including the proliferation of third-party code, increased pressures to develop secure code, and the challenges of multi-threaded applications. It highlights how static analysis tools such as GrammaTech’s CodeSonar can detect defects caused by these complexities, early…

    Read More
  • Finding Concurrency Errors with GrammaTech Static Analysis

    download pdf INTRODUCTION Although decades of advances in miniaturization have yielded enormous performance gains for single processors, it now appears that this era is coming to a close. The industry has placed a big bet on future single-chip performance gains coming from increasing core counts. This will only be a winning wager if the software…

    Read More
  • Easing the Adoption of Static Analysis Into Existing Projects

    download pdf INTRODUCTION The adoption of any new tool into an existing Software Development Process with an established code base is always a challenge. Static analysis tools are no different but there are steps to take to make the transition easier and smooth the introduction of these tools into an existing workflow. In addition, the…

    Read More
  • How Static Analysis Protects Critical Infrastructure from Cyber Threats

    download pdf INTRODUCTION Flip a switch and a room is filled with light. Turn on the tap and clean drinking water flows. We are absolutely dependent on these marvels of modern infrastructure, and we take them completely for granted. It is only when the system breaks down that we are reminded of this reality. As…

    Read More
  • DevSecOps in Safety-Critical Avionics

    download pdf INTRODUCTION DO-178C, Software Considerations in Airborne Systems and Equipment Certification, is a standard published by RTCA, Inc and developed jointly with EUROCAE, the European Organization forCivil Aviation Equipment. Alongside DO-178C is D-326A (U.S.) and ED-202A (Europe) titled “Airworthiness Security Process Specification” and is the only Acceptable Means of Compliance (AMC) by FAA &…

    Read More
  • SBOMs: Reducing Open Source Risk Throughout the Development, Delivery and Deployment of Software

    download pdf Authored By: Jim Routh, Esteemed cybersecurity expert and former CISO and CSO at MassMutual, Aetna and CVSHealth Vince Arneja, Chief Product Officer at GrammaTech Executive Summary The Apache Log4j vulnerability exposed a massive software supply chain weakness in thousands of software applications. The prevalent use of open source components in software is creating…

    Read More

Book a Demo

We’re ready to help you integrate SAST and SCA security into your DevSecOps flow. Get a personally guided tour of our solution offerings to ensure you are receiving the right solution for your development team. 

book now