Chapter 3
Secure Embedded Software Development
Chapter Outline
3.1 Introduction to PHASE—Principles of High-Assurance Software Engineering
3.4 Least Privilege
3.5 Secure Development Process
3.5.1 Change Management
3.5.2 Peer Reviews
3.5.2.1 Security-Oriented Peer Review
3.5.3 Development Tool Security
3.5.3.1 Case Study: The Thompson Hack
3.5.4 Secure Coding
3.5.4.1 Coding Standards
3.5.4.2 Case Study: MISRA C:2004 and MISRA C++:2008
3.5.4.3 Embedded C++
3.5.4.4 Complexity Control
3.5.4.5 Static Source Code Analysis
3.5.4.6 Creating a Tailored Organizational Embedded Coding Standard
3.5.4.7 Preparing for a One-Time ...
Get Embedded Systems Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.