Archive For March, 2013

4 articles

A Better way to Connect: TCF and Simics

By Jakob Engblom How do you actually connect an integrated development environment or a debugger to a target system? This question is more complicated than it might seem to the uninitiated outsider. Traditionally, a range of protocols have been used to connect the development host to a target, most of them vendor-proprietary, and often specialized for a particular purpose (such…

Let’s Talk About Securing the Device

By AJ Shipley In my previous blog post, I touched on the key variables influencing how we approach device security.  In this blog post, I’ll focus the discussion on securing the device.  Before I do, I want to touch briefly on what was a key take away for me from last month’s RSA conference in San Francisco.  This year, the…

The CWE/SANS Top 25 Most Dangerous Software Errors: What it means for embedded developers

By Bill Graham The CWE/Sans Top 25 is fairly well known among security experts but might be overlooked by embedded developers since the list covers all types of systems and programming languages. Developers are fully aware of the quality impacts of many of these errors however they may be less knowledgeable of the security implications. The classic example is the buffer…

Avionics Europe 2013 Conference

By Paul Parkinson Last week I attended the Avionics Europe 2013 conference, which was held in Munich for the last time perhaps (as it is moving to Abu Dhabi in 2014). The theme of this year's conference was 'Tackling the Challenges in Avionics: Single Sky Many Platforms,' which continued to focus on the growth in air traffic across Europe and…