The Role of Tools in Improving Embedded Software Security / Part 3: Mapping the Tools to Activities

Bill Graham

In the previous posts in this series, Part 1: Automation is the Key and Part 2: Security Improvement and the Software Development Lifecycle, I talked about the connection between the typical embedded device development process and the 5+1 improvement framework for embedded security.  Figure 1 is an illustration of this connection (and discussed in more detail in a previous post).

Tools image 1

Figure 1: Mapping the security improvement framework and the device software lifecycle

Continue reading >>