Main Conference Day Two
Wednesday, February 19th, 2020
Key Points: Static Code Analysis, Safety & Security, Functional Safety, Cybersecurity
Are you afraid of finding critical coding bugs too late? Would you like to have evidence that your code either self-written or not is free from overflow, divide-by-zero, out-of-bounds array access, and other run-time errors before you use it in safety and security critical systems? Do you need to comply with safety and security standards or guidelines like MISRA, SEI CERT-C, ISO/IEC TS 17961?
In this presentation, I demonstrate sophisticated static analysis methods that verify and prove the absence of run-time errors and vulnerabilities in the source code at the unit and integration level. Utilizing formal methods (with sound implementation) that consider all potential inputs, controls, and data flows without code execution, organizations will gain confidence that the software they rely on is safe and secure. This gives organizations more than an early error detection tool, it reduces testing and verification costs, and makes code quality transparent across the entire team.