This paper discusses what it really means to achieve coding standard compliance, using MISRA C 2012 and SEI CERT C as examples, and how to accelerate compliance with tool automation, dedicated reporting, and workflow management. The recommendations made here are generic and can be applied to any coding standard.
In this paper, we provide background information on ISO 26262 and its goals. We also discuss some of the policy-related issues associated with developing embedded software that complies with ISO 26262. Finally, we describe how Parasoft can help automotive software development organizations achieve compliance with ISO 26262.
Getting Started with Static Analysis
Static analysis is a powerful way to harden software, finding bugs and security vulnerabilities at the earliest stage of software development. But how do you start?
Read this guide to learn how to systematically introduce and integrate an advanced static analysis tool into your project, successfully.
Tired of waiting for test data?
Test Data Management (TDM) is a big problem for organizations, with the process of procuring, owning, and securing test data both a requirement and a liability.
Parasoft provides a modernized solution to solve these problems. Parasoft’s data simulation approach combines traditional test data extraction along with service virtualization, all in an easy-to-use web interface, so users can quickly build meaningful test data by capturing realistic test data from interactions between components in their existing system, and building data models that can be shared and controlled directly by testing teams. Download this white paper to learn more.
Most organizations are coding at least some security testing, usually in the form of black-box testing, penetration testing, or red teams. This is important, but an engineering approach is to build better, more secure software in the first place. That’s where coding standards come in. In this paper, we’ll take a look at two common cybersecurity coding
standards, CWE and CERT.
The Internet of Things has tremendous promise, some of which has already been realized and valued by consumers everyday. But unfortunately, the reality is that many IoT applications and devices are not ready for ‘prime time.’
IoT solutions are composed of at least two layers, often a deviceat the front-end that collects data and performs specific actions, and a back-end application that processes the data and provides commands. But even in very simple IoT solutions, it can be difficult to ensure ...