1 hour session (All Time Zones)
Presenter: Dr David Long
Time: 10-11am (BST) 11-12pm (CEST) 2.30-3.30pm (IST)
Time: 10-11am (PDT) 11-12pm (MDT) 12-1pm (CDT) 1-2pm (EDT)
Security vulnerabilities resulting from software defects have been studied extensively. The MITRE corporation's list of Common Vulnerabilities and Exposures (CVE) is widely used and has been maintained for almost 20 years! It turns out that weak security is often a direct result of using software language constructs and coding styles that could have been avoided. The problem is that many software developers are not aware of potential insecure features lurking in their code!
Secure coding standards provide guidelines and rules to prevent common security vulnerabilities. Manual checking for coding standard compliance is tedious and error-prone. Static analysis tools can automate the process while also detecting violations that might be missed by other testing approaches.
This webinar highlights rules from the CERT C and MISRA C coding standards that are appropriate for a small embedded system. It will demonstrate how the Perforce Klocwork static analysis tool can apply these rules to identify and fix security vulnerabilities in a typical embedded application, written in C and running under a real-time operating system.
Dr David Long is a Principal Member Technical Staff at Doulos. David will present this training webinar, which will consist of a one-hour session, and will be interactive with Q&A participation (supported by Doulos & Perforce) for attendees.
Attendance is free of charge
If you have any queries, please contact webinars@doulos.com
Visit www.doulos.com/knowhow
Please contact Doulos to schedule a public course to suit you, or to discuss onsite training.