26 - 28 February 2019 // Nuremberg, Germany

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products embedded world 2018
Zoom product LOGO_Static Source Code Analysis

Static Source Code Analysis

LOGO_Static Source Code Analysis

Static Source Code Analysis

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.
Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitor Database.

An error has occurred.

AbsInt offers two static analyzers to check coding guidelines and find programming defects at the C code level: RuleChecker and Astrée.


Astrée is a sound static analyzer designed to prove the absence of runtime errors and further critical program defects. It is based on abstract interpretation – a provably correct formal method. If no errors are reported, this is a guarantee that there are no errors from the class of errors under investigation. Astrée does not require the program under analysis to be instrumented, executed, or stimulated by test cases. The tool can be used on handwritten code, automatically generated code, or by any combination thereof. Open interfaces and full batch mode execution make Astrée ideally suited to be used in continuous verification frameworks. Tool couplings, e.g., to dSPACE TargetLink, are available that provide a seamless integration in existing development environments. By using its Qualification Support Kit and AbsInt’s Qualification Software Life Cycle Data Reports, Astrée can be automatically qualified according to all contemporary safety norms (e.g., ISO 26262 or DO-178B/C).

Astrée reports program defects caused by unspecified and undefined behaviors according to the C norm (ISO/IEC 9899:1999 (E)), program defects caused by invalid concurrent behavior, violations of user-specified programming guidelines, and computes program properties relevant for functional safety.

Users are notified about:

• integer/floating-point division by zero

• out-of-bounds array indexing

• erroneous pointer manipulation and dereferencing (null, uninitialized, and dangling pointers)

• data races (read/write or write/write concurrent accesses by two threads to the same memory location without proper mutex locking)

• inconsistent locking (lock/unlock problems)

• invalid calls to operating system services (e.g. OSEK-calls to TerminateTask() on a task with unreleased resources)

• integer and floating-point arithmetic overflows

• read accesses to uninitialized variables

• unreachable code

• violations of optional user-defined assertions to prove additional runtime properties

• non-terminating loops

Astrée includes RuleChecker to report violations of coding rules and to compute code metric thresholds (MISRA C:2004, MISRA C:2012, HIS metrics, …).


Safety-critical software has to be developed according to coding guidelines to ensure high-quality code, and to reduce the risk of programming errors and security vulnerabilities.

RuleChecker is a static analyzer designed to check coding guidelines and compute code metrics for safety-critical C programs. RuleChecker is fast and easy to use. Multiple result views and graphical visualizations enable an efficient result exploration.

RuleChecker supports:

- MISRA C:2004

- MISRA C:2012 incl. Amendment 1

- ISO/IEC TS 17961:2013

- SEI CERT Secure C

- MITRE Common Weakness Enumeration (CWE).

RuleChecker can be coupled with the sound static analyzer Astrée to guarantee zero false negatives and minimal false positives on semantical rules.

RuleChecker is fully batch-mode compatible and can be used in continuous integration frameworks. Open formats enable the analysis results to be automatically processed. A Jenkins plugin is available.

RuleChecker can be automatically qualified according to all relevant safety norms, including ISO-26262, DO-178B/C, IEC-61508, EN-50128, etc.

Timing Analysis for Real-Time Software

LOGO_Timing Analysis for Real-Time Software

Stack Usage Analysis

LOGO_Stack Usage Analysis



Static Source Code Analysis is assigned to following product groups:


The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access to exhibitors or products saved – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.