Conferences and supporting programme
Internet of Threats? - A Code Quality Management Strategy
HP Security Research (2015), found that 70% of the most commonly used IoT devices, such as smart thermostats and home security systems, contain serious security vulnerabilities. The rising number of complex connected devices invites attacks on multiple fronts, from client applications and cloud services to firmware and applications. We need to prevent the Internet of Things (IoT) from becoming the “Internet of Threats”. How should we protect ourselves? The answer lies in finding software vulnerabilities in the applications as early as possible in the development stage. This can be achieved by incorporating code quality management including static analysis into your software development process. In this paper, we will outline the different types of software verification and provides advantages and drawbacks for each of them. We will explain that the most effective and proven methodology is by using static analysis tools with a coding standard. We will then provide the added benefits from using a static analysis tool and finally, we will provide concrete examples where static analysis has made a real difference.
--- Date: 28.02.2018 Time: 10:30 AM - 11:00 AM Location: Conference Counter NCC Ost