Common Embedded Vulnerabilities, Part 2: Information Leaks (.PDF Download)

Sept. 3, 2015

Following Part 1 of this series on source-code weaknesses, which discussed code injections, this second installment delves into information leaks (some prefer the term information exposure). Information leaks occur when a program inadvertently communicates sensitive information inappropriately...

Register or Sign in below to download the full article in .PDF format, including high resolution graphics and schematics when applicable.

Sponsored

The Flyback Power-Supply Architecture and Operation

The flyback topology is a versatile, widely used, switched-mode power-supply design with some interesting characteristics that brings performance and BOM advantages to many applications...

What's the Difference Between AC-DC and DC-DC Power Supplies?

Significant complications arise when trying to get your power supply working from a wall outlet.

Factor PFC Into Your Power-Supply Design

Stricter guidelines imposed by version 3 of the IEC standard for harmonic current emissions push designers to embrace power-factor-correction methodologies.

5 LDO Regulators with High Output Current

High output current, also referred to as Iout, might be an important spec for your low-dropout (LDO) linear regulator.