SlideShare a Scribd company logo
1 of 20
1
Zero bug software
Mathematically Guaranteed
2
Youwillget the slidesvia email
Youwillget the recording in the coming days
Please ask questionsin the Q&A section
Vic Sharma
US executive
JakubZwolakowski
R&D engineer
Welcome !
3
In 2015 a team of hackers attemptedto take controlof an unmannedmilitary
helicopter knownas LittleBird.
After six weeks, they failedto crack LittleBird’s defenses.
The helicopter’s software was
Securedby DARPA using
formal methods
4
Formal methods:
the most exhaustive approach to code analysis
Source code is formulated asa sequence of logical
constructions and mathematicaltheorems
(abstract interpretation, model checking, symbolic
execution…)
C/C++ source code
The mathematical/logical model and
specifications are compared
• The program works as specified for all
possibles input values and never crashes
• There is a mathematicalassurancethere
are no undefined behaviors left
The program has undefined behaviors
and needs to be corrected
Mathematical model
5
<
<<<<<<
Built on 30 years of research and development at French
Atomic Energy Commission (CEA) and initiallyused to secure
code in airplanes
Based on30 years of R&D
Recognized bythe NIST as the first tool to meet the SATE V
Ockham criteria of exhaustivityand soundness and able to
guarantee the absence of CWE key classesin ARM Mbed TLS
Recognized by NIST
Adopted by worldwide leading companies in aeronautics, defense,
automotive, IoT, telecom & electronics
Market proven
TrustInSoft has been distinguished with awards from numerous
reference bodies such asthe LinuxFoundation and the RSA
Conference
Award winning
About Trust In Soft
6
03
LOGO
7
Hybrid code Analyzer combining advanced static
and dynamic analysis techniques together with
formal methods to mathematically guarantee C/C++
code quality & maximize code security and safety
TrustInSoft Analyzer
8
Resolving the Achilles’
heel of C and C++:
Detecting all Undefined
Behaviors
• Memory access
• Buffer overflow
• Access out of bounds
• Invalid pointers usage
• Non-initialized variables
• etc…
• Arithmetic operations
• Division by zero
• Integer signed overflows
• Overflow in float-to-int conversion
• NaN in float computation
• etc…
• Race conditions
Unpredictable outputs or program execution
Code execution by an attacker & program intrusion
Software misbehavior or crash
Undefined behaviors are complex to detect and can
lead to disastrous consequences:
9
The best-of benefits of application security testing
TrustInSoftAnalyzer
Traditionalsyntacticanalyzers (Coverity, Checkmarx,
Klocwork, Parasoft, Veracode….)
Analysis type Semantic Syntactic
What it does
Applies formal methods to look for issues that cause undefined behaviors and checks
execution for all possible input values
Looks for suspicious codeconstructs / coding rules compliance
Sound Yes No
False positives / False negatives Some/No Many / Yes
Output All undefined behaviors detected / confidence on codequality List of potential bugs
10
Incremental journey to maximum safety & security
Replay existing tests Generalize inputs & static analysis Check functional implementation
• Instant productivity: find more bugs quicker
• Mathematical guarantee that Undefined
Behaviors resulting from discrete tested
values are all detected
• 0 false positives & 0 false negatives
• Mathematical guarantee that all Undefined
Behaviours are detected
• 0 false negatives
• Achieve up to 100% coverage on critical tests
• Ensure implemented SW architecture and
functions behave in line with spec
• Full mathematical guarantee for safety and
security
1. Interpreter 2. Analyzer 3. Functional proof
11
+
Formal methods
(abstractinterpretation,symbolicexecution, hoare’slogic, model checking, weakestprecondition…)
Thebenefitsof:
• Reasons onapplication source code
• Explores all possible execution paths
Static AST Dynamic AST Interactive AST
• Exhaustive input value coverage
• Memory error & undefined behavior
detection
• ACSL functional specification
• Checks/Proves codebehavior matches
specification
The best-of benefits of application security testing
12
Empowering SW developers & testers to…
Ensure absence of crashes and
deterministic behavior. Detect 0-days
before they are known. Platform
specific analysis without compiling.
Exhaustively find and fix all Undefined
Behaviors
incl. the most hidden ones
Determines and propagates the
superset of all possible code values in
execution paths.
Boost coverage. Perform quickly the
equivalent of billions of tests with 1
generalized inputs test
Functional proof & absence of
Undefined Behaviors (e.g. buffer
overflow).
Get mathematical guarantees on
software security/safety
Code
safety
&
security
13
Our customers’ primary drivers
 Reduce SW test coverage
costs
 Bugs identification &
remediation optimization
 Bug correction prioritization
(no false positive)
 Perform tests as if on target
IMPROVE OPERATIONAL
EFFICIENCY
 Position safety and/or security
as a feature to gain market
share
 Get certification level /
smooth customer validation
as a price premium
 Secure Time to Market
sensitive opportunities
GENERATE REVENUE
OPPORTUNITIES
CONTROL
FINANCIAL RISK
 Reduce field support costs
post-production
 Avoid brand/image valuation
impact
Beyond Software Security and Safety
14
Improve Operational Efficiency
Software coverage tests costs reduction
Context
• Industry: Aeronautics, Tier one Aeronautics SW provider
• Product: In plane Gateway Communication Software Stack
• Objective: SW Security enhancement
Actions done
• Generalized exhaustive software tests
• All bugs at stage 1 detected & generalizing the inputs at stage 2
• Continuously replay the tests once bugs were fixed in successive SW commit
Customer achievements
• Verification time reduced from 4 months to 1 month
• SW tests coverage is a million times superior to previous test base
Cost impact
• SW verification effort divided by 4
15
15
Improve Operational Efficiency
Bugs detection & remediation optimization
Context
• Industry: Consumer Electronics
• Product: Consumer Gateway software stack
• Objective: Evaluate TrustInSoft benefits to reduce code verification efforts/Bugs
finding
Actions done
• Replay existing tests in TrustInSoft Analyzer at stage 1
• Generalize test inputs at stage 2
Customer achievements
• Before using TIS Analyzer: 2 developers during 1 week to identify the bug (10 man-
days)
• With TrustInSoft Analyzer: bug found & fixed in 2 hours
Cost impact
• Divide by 40 the effort for bug detection/correction
16
Generate Revenue Opportunities
Market share driver
Context
• Industry: Rail, Tier 1 Rail software provider
• Product: Automatic embedded software >300k LOC managing
sensors inputs
• Objective: Guarantee Mathematically the safety of the critical functions
Actions done
• Exhaustively generalize the inputs at stage 2
Customer achievements
• No undefined behaviors were left in the source code for all possible inputs
• Ensured software deterministic behavior & no crashes whatever the inputs
• Achieve 100% input coverage on all/critical functions
Cost impact
• Increase market share – Differentiation through the mathematical guarantee to meet
the customer extremely high level of safety requirements
17
Control Financial Risk
Field Support costs reduction
Context
• Industry: Smart meter, Tier one provider
• SW stack measuring customer energy consumption
Actions done
• Replay existing tests in TIS Analyzer to detect and remove Undefined Behaviours
• Write more tests to increase % of functions covered
• Generalize the inputs to increase % of states/values covered
Customer achievements
• Detected & fixed critical bugs
• Coverage increase from 6% to 45%
Cost impact
• Reduce field support costs
• Increase security level
18
How is it deployed
TrustInSoft Analyzer can be installed on a dedicated server,
either on-premises or in SaaS
Can be accessed through a
web browser or via
command line interface
Can be integrated to existing
DevOps and Continuous
Integration process via
command line
19
25638(264-1)
This is the number of tests that we are going to perform in the following
demo
601226901190101306307114457
156718501627879601505979836
324242994413590530419161514
337036842790287400677240995
840
Thank you!
contact@trust-in-soft.com

More Related Content

What's hot

Mdd test qa_test2014_bryan_bakker
Mdd test qa_test2014_bryan_bakkerMdd test qa_test2014_bryan_bakker
Mdd test qa_test2014_bryan_bakkerBryan Bakker
 
Driving Risks Out of Embedded Automotive Software
Driving Risks Out of Embedded Automotive SoftwareDriving Risks Out of Embedded Automotive Software
Driving Risks Out of Embedded Automotive SoftwareParasoft
 
plan for penetration test
plan for penetration testplan for penetration test
plan for penetration testhetvi naik
 
Key Findings from the 2019 State of DevOps Report
Key Findings from the 2019 State of DevOps ReportKey Findings from the 2019 State of DevOps Report
Key Findings from the 2019 State of DevOps ReportPuppet
 
St & internationalization
St & internationalizationSt & internationalization
St & internationalizationSachin MK
 
formal verification
formal verificationformal verification
formal verificationToseef Aslam
 
Ch15 software reliability
Ch15 software reliabilityCh15 software reliability
Ch15 software reliabilityAbraham Paul
 
Top Ten things that have been proven to effect software reliability
Top Ten things that have been proven to effect software reliabilityTop Ten things that have been proven to effect software reliability
Top Ten things that have been proven to effect software reliabilityAnn Marie Neufelder
 
Four things that are almost guaranteed to reduce the reliability of a softwa...
Four things that are almost guaranteed to reduce the reliability of a softwa...Four things that are almost guaranteed to reduce the reliability of a softwa...
Four things that are almost guaranteed to reduce the reliability of a softwa...Ann Marie Neufelder
 
Deploy + Destroy Complete Test Environments
Deploy + Destroy Complete Test EnvironmentsDeploy + Destroy Complete Test Environments
Deploy + Destroy Complete Test EnvironmentsParasoft
 
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...Akond Rahman
 
Defect prevention techniques
Defect prevention techniquesDefect prevention techniques
Defect prevention techniquesZarko Acimovic
 

What's hot (20)

Static Code Analysis
Static Code AnalysisStatic Code Analysis
Static Code Analysis
 
Mdd test qa_test2014_bryan_bakker
Mdd test qa_test2014_bryan_bakkerMdd test qa_test2014_bryan_bakker
Mdd test qa_test2014_bryan_bakker
 
Driving Risks Out of Embedded Automotive Software
Driving Risks Out of Embedded Automotive SoftwareDriving Risks Out of Embedded Automotive Software
Driving Risks Out of Embedded Automotive Software
 
Software Testing Concepts
Software Testing  ConceptsSoftware Testing  Concepts
Software Testing Concepts
 
plan for penetration test
plan for penetration testplan for penetration test
plan for penetration test
 
Key Findings from the 2019 State of DevOps Report
Key Findings from the 2019 State of DevOps ReportKey Findings from the 2019 State of DevOps Report
Key Findings from the 2019 State of DevOps Report
 
St & internationalization
St & internationalizationSt & internationalization
St & internationalization
 
formal verification
formal verificationformal verification
formal verification
 
Vinay Singh
Vinay SinghVinay Singh
Vinay Singh
 
Ch15 software reliability
Ch15 software reliabilityCh15 software reliability
Ch15 software reliability
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
Software testing
Software testingSoftware testing
Software testing
 
Top Ten things that have been proven to effect software reliability
Top Ten things that have been proven to effect software reliabilityTop Ten things that have been proven to effect software reliability
Top Ten things that have been proven to effect software reliability
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
Embedded world 2017
Embedded world 2017Embedded world 2017
Embedded world 2017
 
Four things that are almost guaranteed to reduce the reliability of a softwa...
Four things that are almost guaranteed to reduce the reliability of a softwa...Four things that are almost guaranteed to reduce the reliability of a softwa...
Four things that are almost guaranteed to reduce the reliability of a softwa...
 
Deploy + Destroy Complete Test Environments
Deploy + Destroy Complete Test EnvironmentsDeploy + Destroy Complete Test Environments
Deploy + Destroy Complete Test Environments
 
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
 
Software testing
Software testingSoftware testing
Software testing
 
Defect prevention techniques
Defect prevention techniquesDefect prevention techniques
Defect prevention techniques
 

Similar to Zero-bug Software, Mathematically Guaranteed

Mathematically Guaranteeing Code Correctness with TrustInSoft
Mathematically Guaranteeing Code Correctness with TrustInSoftMathematically Guaranteeing Code Correctness with TrustInSoft
Mathematically Guaranteeing Code Correctness with TrustInSoftAshley Zupkus
 
How To Improve Quality With Static Code Analysis
How To Improve Quality With Static Code Analysis How To Improve Quality With Static Code Analysis
How To Improve Quality With Static Code Analysis Perforce
 
Agile Development in Aerospace and Defense
Agile Development in Aerospace and DefenseAgile Development in Aerospace and Defense
Agile Development in Aerospace and DefenseJim Nickel
 
Testing Interview Questions.pdf
Testing Interview Questions.pdfTesting Interview Questions.pdf
Testing Interview Questions.pdfPradeepaKannan6
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product SecuritySoftServe
 
5WCSQ - Quality Improvement by the Real-Time Detection of the Problems
5WCSQ - Quality Improvement by the Real-Time Detection of the Problems5WCSQ - Quality Improvement by the Real-Time Detection of the Problems
5WCSQ - Quality Improvement by the Real-Time Detection of the ProblemsTakanori Suzuki
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Mykhailo Antonishyn
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security Rogue Wave Software
 
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Sigma Software
 
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)TelecomValley
 
Automating The Process For Building Reliable Software
Automating The Process For Building Reliable SoftwareAutomating The Process For Building Reliable Software
Automating The Process For Building Reliable Softwareguest8861ff
 
IRJET- Research Study on Testing Mantle in SDLC
IRJET- Research Study on Testing Mantle in SDLCIRJET- Research Study on Testing Mantle in SDLC
IRJET- Research Study on Testing Mantle in SDLCIRJET Journal
 
Parasoft .TEST, Write better C# Code Using Data Flow Analysis
Parasoft .TEST, Write better C# Code Using  Data Flow Analysis Parasoft .TEST, Write better C# Code Using  Data Flow Analysis
Parasoft .TEST, Write better C# Code Using Data Flow Analysis Engineering Software Lab
 
Fundamentals_of_testing.pdf
Fundamentals_of_testing.pdfFundamentals_of_testing.pdf
Fundamentals_of_testing.pdfAndreeaDavid22
 
[India Merge World Tour] Coverity
[India Merge World Tour] Coverity[India Merge World Tour] Coverity
[India Merge World Tour] CoverityPerforce
 
Software engineering quality assurance and testing
Software engineering quality assurance and testingSoftware engineering quality assurance and testing
Software engineering quality assurance and testingBipul Roy Bpl
 
What are Software Testing Methodologies | Software Testing Techniques | Edureka
What are Software Testing Methodologies | Software Testing Techniques | EdurekaWhat are Software Testing Methodologies | Software Testing Techniques | Edureka
What are Software Testing Methodologies | Software Testing Techniques | EdurekaEdureka!
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Securitysedukull
 

Similar to Zero-bug Software, Mathematically Guaranteed (20)

Mathematically Guaranteeing Code Correctness with TrustInSoft
Mathematically Guaranteeing Code Correctness with TrustInSoftMathematically Guaranteeing Code Correctness with TrustInSoft
Mathematically Guaranteeing Code Correctness with TrustInSoft
 
How To Improve Quality With Static Code Analysis
How To Improve Quality With Static Code Analysis How To Improve Quality With Static Code Analysis
How To Improve Quality With Static Code Analysis
 
Agile Development in Aerospace and Defense
Agile Development in Aerospace and DefenseAgile Development in Aerospace and Defense
Agile Development in Aerospace and Defense
 
Agile and Secure Development
Agile and Secure DevelopmentAgile and Secure Development
Agile and Secure Development
 
Testing Interview Questions.pdf
Testing Interview Questions.pdfTesting Interview Questions.pdf
Testing Interview Questions.pdf
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
 
5WCSQ - Quality Improvement by the Real-Time Detection of the Problems
5WCSQ - Quality Improvement by the Real-Time Detection of the Problems5WCSQ - Quality Improvement by the Real-Time Detection of the Problems
5WCSQ - Quality Improvement by the Real-Time Detection of the Problems
 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
 
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"
 
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)
 
Automating The Process For Building Reliable Software
Automating The Process For Building Reliable SoftwareAutomating The Process For Building Reliable Software
Automating The Process For Building Reliable Software
 
IRJET- Research Study on Testing Mantle in SDLC
IRJET- Research Study on Testing Mantle in SDLCIRJET- Research Study on Testing Mantle in SDLC
IRJET- Research Study on Testing Mantle in SDLC
 
Parasoft .TEST, Write better C# Code Using Data Flow Analysis
Parasoft .TEST, Write better C# Code Using  Data Flow Analysis Parasoft .TEST, Write better C# Code Using  Data Flow Analysis
Parasoft .TEST, Write better C# Code Using Data Flow Analysis
 
Fundamentals_of_testing.pdf
Fundamentals_of_testing.pdfFundamentals_of_testing.pdf
Fundamentals_of_testing.pdf
 
[India Merge World Tour] Coverity
[India Merge World Tour] Coverity[India Merge World Tour] Coverity
[India Merge World Tour] Coverity
 
Software engineering quality assurance and testing
Software engineering quality assurance and testingSoftware engineering quality assurance and testing
Software engineering quality assurance and testing
 
What are Software Testing Methodologies | Software Testing Techniques | Edureka
What are Software Testing Methodologies | Software Testing Techniques | EdurekaWhat are Software Testing Methodologies | Software Testing Techniques | Edureka
What are Software Testing Methodologies | Software Testing Techniques | Edureka
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Security
 

Recently uploaded

SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 

Recently uploaded (20)

SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 

Zero-bug Software, Mathematically Guaranteed

  • 2. 2 Youwillget the slidesvia email Youwillget the recording in the coming days Please ask questionsin the Q&A section Vic Sharma US executive JakubZwolakowski R&D engineer Welcome !
  • 3. 3 In 2015 a team of hackers attemptedto take controlof an unmannedmilitary helicopter knownas LittleBird. After six weeks, they failedto crack LittleBird’s defenses. The helicopter’s software was Securedby DARPA using formal methods
  • 4. 4 Formal methods: the most exhaustive approach to code analysis Source code is formulated asa sequence of logical constructions and mathematicaltheorems (abstract interpretation, model checking, symbolic execution…) C/C++ source code The mathematical/logical model and specifications are compared • The program works as specified for all possibles input values and never crashes • There is a mathematicalassurancethere are no undefined behaviors left The program has undefined behaviors and needs to be corrected Mathematical model
  • 5. 5 < <<<<<< Built on 30 years of research and development at French Atomic Energy Commission (CEA) and initiallyused to secure code in airplanes Based on30 years of R&D Recognized bythe NIST as the first tool to meet the SATE V Ockham criteria of exhaustivityand soundness and able to guarantee the absence of CWE key classesin ARM Mbed TLS Recognized by NIST Adopted by worldwide leading companies in aeronautics, defense, automotive, IoT, telecom & electronics Market proven TrustInSoft has been distinguished with awards from numerous reference bodies such asthe LinuxFoundation and the RSA Conference Award winning About Trust In Soft
  • 7. 7 Hybrid code Analyzer combining advanced static and dynamic analysis techniques together with formal methods to mathematically guarantee C/C++ code quality & maximize code security and safety TrustInSoft Analyzer
  • 8. 8 Resolving the Achilles’ heel of C and C++: Detecting all Undefined Behaviors • Memory access • Buffer overflow • Access out of bounds • Invalid pointers usage • Non-initialized variables • etc… • Arithmetic operations • Division by zero • Integer signed overflows • Overflow in float-to-int conversion • NaN in float computation • etc… • Race conditions Unpredictable outputs or program execution Code execution by an attacker & program intrusion Software misbehavior or crash Undefined behaviors are complex to detect and can lead to disastrous consequences:
  • 9. 9 The best-of benefits of application security testing TrustInSoftAnalyzer Traditionalsyntacticanalyzers (Coverity, Checkmarx, Klocwork, Parasoft, Veracode….) Analysis type Semantic Syntactic What it does Applies formal methods to look for issues that cause undefined behaviors and checks execution for all possible input values Looks for suspicious codeconstructs / coding rules compliance Sound Yes No False positives / False negatives Some/No Many / Yes Output All undefined behaviors detected / confidence on codequality List of potential bugs
  • 10. 10 Incremental journey to maximum safety & security Replay existing tests Generalize inputs & static analysis Check functional implementation • Instant productivity: find more bugs quicker • Mathematical guarantee that Undefined Behaviors resulting from discrete tested values are all detected • 0 false positives & 0 false negatives • Mathematical guarantee that all Undefined Behaviours are detected • 0 false negatives • Achieve up to 100% coverage on critical tests • Ensure implemented SW architecture and functions behave in line with spec • Full mathematical guarantee for safety and security 1. Interpreter 2. Analyzer 3. Functional proof
  • 11. 11 + Formal methods (abstractinterpretation,symbolicexecution, hoare’slogic, model checking, weakestprecondition…) Thebenefitsof: • Reasons onapplication source code • Explores all possible execution paths Static AST Dynamic AST Interactive AST • Exhaustive input value coverage • Memory error & undefined behavior detection • ACSL functional specification • Checks/Proves codebehavior matches specification The best-of benefits of application security testing
  • 12. 12 Empowering SW developers & testers to… Ensure absence of crashes and deterministic behavior. Detect 0-days before they are known. Platform specific analysis without compiling. Exhaustively find and fix all Undefined Behaviors incl. the most hidden ones Determines and propagates the superset of all possible code values in execution paths. Boost coverage. Perform quickly the equivalent of billions of tests with 1 generalized inputs test Functional proof & absence of Undefined Behaviors (e.g. buffer overflow). Get mathematical guarantees on software security/safety Code safety & security
  • 13. 13 Our customers’ primary drivers  Reduce SW test coverage costs  Bugs identification & remediation optimization  Bug correction prioritization (no false positive)  Perform tests as if on target IMPROVE OPERATIONAL EFFICIENCY  Position safety and/or security as a feature to gain market share  Get certification level / smooth customer validation as a price premium  Secure Time to Market sensitive opportunities GENERATE REVENUE OPPORTUNITIES CONTROL FINANCIAL RISK  Reduce field support costs post-production  Avoid brand/image valuation impact Beyond Software Security and Safety
  • 14. 14 Improve Operational Efficiency Software coverage tests costs reduction Context • Industry: Aeronautics, Tier one Aeronautics SW provider • Product: In plane Gateway Communication Software Stack • Objective: SW Security enhancement Actions done • Generalized exhaustive software tests • All bugs at stage 1 detected & generalizing the inputs at stage 2 • Continuously replay the tests once bugs were fixed in successive SW commit Customer achievements • Verification time reduced from 4 months to 1 month • SW tests coverage is a million times superior to previous test base Cost impact • SW verification effort divided by 4
  • 15. 15 15 Improve Operational Efficiency Bugs detection & remediation optimization Context • Industry: Consumer Electronics • Product: Consumer Gateway software stack • Objective: Evaluate TrustInSoft benefits to reduce code verification efforts/Bugs finding Actions done • Replay existing tests in TrustInSoft Analyzer at stage 1 • Generalize test inputs at stage 2 Customer achievements • Before using TIS Analyzer: 2 developers during 1 week to identify the bug (10 man- days) • With TrustInSoft Analyzer: bug found & fixed in 2 hours Cost impact • Divide by 40 the effort for bug detection/correction
  • 16. 16 Generate Revenue Opportunities Market share driver Context • Industry: Rail, Tier 1 Rail software provider • Product: Automatic embedded software >300k LOC managing sensors inputs • Objective: Guarantee Mathematically the safety of the critical functions Actions done • Exhaustively generalize the inputs at stage 2 Customer achievements • No undefined behaviors were left in the source code for all possible inputs • Ensured software deterministic behavior & no crashes whatever the inputs • Achieve 100% input coverage on all/critical functions Cost impact • Increase market share – Differentiation through the mathematical guarantee to meet the customer extremely high level of safety requirements
  • 17. 17 Control Financial Risk Field Support costs reduction Context • Industry: Smart meter, Tier one provider • SW stack measuring customer energy consumption Actions done • Replay existing tests in TIS Analyzer to detect and remove Undefined Behaviours • Write more tests to increase % of functions covered • Generalize the inputs to increase % of states/values covered Customer achievements • Detected & fixed critical bugs • Coverage increase from 6% to 45% Cost impact • Reduce field support costs • Increase security level
  • 18. 18 How is it deployed TrustInSoft Analyzer can be installed on a dedicated server, either on-premises or in SaaS Can be accessed through a web browser or via command line interface Can be integrated to existing DevOps and Continuous Integration process via command line
  • 19. 19 25638(264-1) This is the number of tests that we are going to perform in the following demo 601226901190101306307114457 156718501627879601505979836 324242994413590530419161514 337036842790287400677240995 840