Search by keyword:
(enter all or part)
Clear filter Filter
By Product/Module
TopicDetails
ISO 26262 Software Tool QualificationThis session details about the process for the software tool qualification as per ISO 26262 Part 8. This process changes based on different ASIL levels. It will include details about tool confidence levels and steps to be performed based on TD selection. We will provide insight to the tool qualification options of LDRA tool suite and steps needed to qualify based on different ASIL levels.Learn more
Reducing Testing Efforts using TBextremeSoftware verification and validation in any process standard demands source code testing and coverage analysis. This is one of the mandates for developing safety-critical applications.   This session will highlight about reducing the testing efforts using TBextreme. And will showcase how to generate the test cases automatically for boundary value analysis, Min, Mid and Max values for the variables. The Boundary and Min, Mid, Max generation for data type as well as requirements based values. The session will also highlight about achieving maximum coverage with one click by returning different values from stub functions.Learn more
Engineering Education in Post COVID Era - Opportunities and Challenges for FacultiesThe academic community is witnessing the change of an era, with online classroom becoming a part of the ‘new normal’, our approach towards the students and delivery mechanism needs a re-look. The speaker will explain how faculties should utilize this excellent opportunity to develop their Thought Leadership to a wider canvas, beyond their traditional campuses.Learn more
Influential Thought Leadership Development for Functional Safety and Security ProfessionalsThis session is aimed to help technology professionals and University faculties by explaining the ways on how one could effectively evolve over a period as an Expert to a Thought Leader and finally emerge as an Influential Thought Leader, in today’s fast-emerging Functional Safety and Security domain.Learn more
Why MISRA Matters!In this talk, Andrew Banks will discuss the importance of the static analysis in general, and the MISRA C/C++ Guidelines in particular, within Verification and Validation ("V&V") activities. It will showcase common pitfalls that MISRA seeks to help avoid, and rationale behind some of the guidelines, while introducing the recent Amendment 2 to MISRA C:2012. The presentation will also highlight why it is important to analyse and release "production" code.Learn more
Ease of Certification & Test management using TBmanagerThis session will help you to reduce the testing efforts for certification of a particular process standard. One of the mandate in software project while complying to any process standard is to perform requirements-based testing and traceability across the entire life cycle. Doing this manually and complying to every object is challenging and most importantly time taking and can be prone to errors. This session will highlight how LDRA’s TBmanager tool helps in tracking the progress of process standard objectives and performing the Bi-directional traceability between Requirements, source code, and test cases. This session will include the impact analysis when there change in requirement, source code or the test case results and its impact on the project.Learn more
Emerging Opportunities & Career Planning for Young Engineers in Post COVID EraTo be successful in today's highly volatile world, young engineers should have a vision along with a long-term career planning. This session talks about how to set a career path that keeps you motivated to face these tough times. The presenter will also address several issues and the possible solutions for surviving in this highly dynamic technology job market.Learn more
MISRA C in an ISO 26262 ContextFrom its inception, MISRA C has been inextricably linked to automotive functional safety requirements.  This was enshrined within ISO 26262, with MISRA being a recommended approach… a relationship that has been renewed with the 2nd Edition.Learn more
LDRA & Intland: Accelerating Delivery while Reducing the Cost of Compliance for Critical Embedded SoftwareEach year, the amount and complexity of embedded software in safety and security-critical systems continues to grow. At the same time, technologies such as Artificial Intelligence, machine learning, Internet of Things, and autonomous controls are being deployed to make products ‘smarter’ while making it more challenging to ensure they are safe and secure. The combination of the growth of embedded software and the growth of safety and security requirements is putting a strain on traditional systems and software development processes and tools.Learn more
The MISRA Myth Busted: Design Patterns, Safety and SecurityThis webinar is a part of webinar series by Skills Development & Communication Work Group of IESA Automotive Core Initiative Group. When examined with a critical eye, the commonly held belief that security and safety critical code are hugely different to each other is a conundrum. Why would that be? The same attributes that make code safe also make it secure, making MISRA C:2012 equally applicable to safety and security critical applications – a position underlined with the release of MISRA C:2012 – Addendum 2.Learn more
Software security for the connected carEarly in the 2010s, a number of incidents helped break down any complacency surrounding the security of connected cars. Police intervention to shut down a stolen car by compromising the 2012 GM OnStar system helped raise awareness that connected cars are potentially vulnerable. Work since then has largely focused on the secure architectural design of automotive systems, but automotive OEMs are increasingly also requiring developers to prove that their software meets the highest standards for security as well as safety.Learn more
Accomplishing the Verification Objectives in the Software Lifecycle: An ISO 26262 PerspectiveThis webinar is a part of webinar series by Skills Development & Communication Work Group of IESA Automotive Core Initiative Group. Functional safety is an unavoidable paradigm in automotive electrical and electronic system development. Performing the lifecycle activities and establishing the confidence with required work products in each lifecycle stage is a challenge. In this webinar we are focusing on verification objectives in software lifecycle process and how do we do it with automated and integrated tools.Learn more
ISO 26262 Software Tool QualificationThis session details about the process for the software tool qualification as per ISO 26262 Part 8. This process changes based on different ASIL levels. This session will include details about tool confidence levels and steps to be performed based on TD selection. We will provide insight to the tool qualification options of LDRA tool suite and steps needed to qualify based on different ASIL levels.Learn more
Defence-in-depth: Applying the Swiss cheese model to the IIoTThe “Internet of Things” promises a world of convenience, efficiency, and economic opportunity. But history has taught us to be wary of the “touch of human weakness” - opportunists amongst us who will seek to disrupt or to take dishonest advantage.Learn more
A Primer for Functional Safety for IEC 61508Join ISA and LDRA where this webinar will focus on Functional Safety with respect to IEC 61508, the de facto standard and the basis of other functional safety standards for multiple safety-critical domains.Learn more
Aerospace Cybersecurity with Reusable Software Components in DO-326 FrameworkAerospace certification processes are tilted towards a rigorous verification process to ensure the safety-critical functions meet appropriate design assurance levels. However, in today's time security also has become the prime challenge in modern aerospace system development and certification. The aviation network and even the aircraft are getting connected to the internet(nose-to-tail) and other private networks.Learn more
Coding standards for security enhancementCoding languages such as C and C++ include characteristics that can lead to vulnerabilities in the hands of the unwary. Small wonder, then, that in developing its top 10 secure coding practices, the CERT organization shone a spotlight on how the application of a secure coding standard can help to avoid them.Learn more
The role of application code in secure embedded systems Advice on the development of secure systems is seemingly everywhere. New standards emerge almost daily, and yet most are high level documents that lend little detail to explain just what best practice means to the developer.  Learn more
Understand Software Quality’s Three-Legged Stool: Static Analysis, Dynamic Analysis, and Unit Testing Think you’ve found a silver bullet to improve software quality? Think again. No single process can assure software quality, and even the common two-stage approach of static and dynamic analysis isn’t enough. Useful though they are, only a three-legged approach that brings unit and integration testing into the mix can really make a difference.  Learn more
The practicalities of MISRA compliance There are many static analysis tools available to assess code compliance with MISRA guidelines. But the identification and rectification of violations flagged by a tool represents only one part of the compliance process. Step back from the analysis of violations and the need to address bigger questions about the process as a whole becomes obvious. Learn more
Cybersecurity clouds over the bright future of smart grids Cybersecurity represents a dark cloud overshadowing the “smart grid” modernization of the existing electrical grid system that enhances customers' and utilities' ability to monitor, control, and predict energy use. The need for a secure enterprise-level architecture in defending against potentially devastating blackouts is widely acknowledged, but the role played by securely coded devices is easier to ignore and yet vitally important.   Learn more
A Primer on Functional Safety for IEC 61508The adherence to the compliance and certification objectives dictated by functional safety and security standards like IEC 61508 pose multiple challenges for Industrial Control System suppliers. Conformance with domain and country-specific regulatory guidelines requires planning from the early stages of the product/project lifecycle. A lack of understanding of compliance objectives causes project delays and overruns, impacting resources, time and money; in extreme cases, perhaps resulting in punitive damages.Learn more
How to Increase Efficiency in Testing and Confidence in Safety Standard ComplianceTesting plays a key role in the successful development of safety-critical systems. However, many organizations still perform testing manually which can lead to the introduction of errors, inconsistencies in code analysis, delays in project timelines, and increased chances of recalls or failure to meet safety standards.Learn more
GM’s Software Coding Standards for Software SuppliersFueled by more capable and lower cost processors and the increasing demands on functional safety, a better driver and passenger experience, economic efficiency, connectivity, and even autonomy, the complexity in the automobile is accelerating. Learn more
Preparing academia for Industry 4.0 IIoT (Industrial Internet of Things/Industry 4.0/Industrial Internet) is the application of IoT to the manufacturing industry. It would encompass IT (Information Technology) and OT (Operational Technology). Industrial Control Systems (ICS) is a major segment within the operational technology sector. It comprises systems (ICS is an aggregate name of various system types like PCS-Process Control Systems, DCS-Distributed Control Systems, SCADA- Supervisory Control and Data Acquisition, PLC-Programmable Logic Controller and SIS-Safety Instrumented System) which are used to monitor and control industrial processes.Learn more
Don’t let your data taint your system securityThe CERT division of the Software Engineering Institute is a leader in cybersecurity. Of their top 10 secure coding practices, two focus on the sanitization of untrusted data – “Validate input” and “Sanitize data sent to other systems”.Learn more
Highly critical systems: How far can you trust your compiler?Verification and validation practices championed by functional safety, security and coding standards (including IEC 61508, ISO 26262, IEC 62304, MISRA C, CWE…) place considerable emphasis on showing how much of an application under test has been exercised. Experience has shown us that if code has been shown to perform correctly, then the probability of failure in the field is considerably lower. And yet almost without exception, the focus of this laudable endeavour is on the high level source code – whether that is written in C, C++, or whatever.Learn more
Cutting edge test tools in the world of the bug huntBug-hunting and is not an activity you’d associate with safety-critical software. A bug hunt is a robust explorative test that finds bugs and vulnerabilities in applications, involving company members of all levels including developers, managers, and support technicians, and that is certainly not how critical aeronautical applications are tested!Learn more
AUTOSAR Adaptive, AUTOSAR Classic, and Coding Standards: A Platform for SuccessIn December 2017, the AUTOSAR family of standards expanded to embrace the new “Adaptive Platform,” with the existing development branch now known as the “Classic Platform”. The Classic Platform is AUTOSAR’s established solution for embedded systems with hard real-time and safety constraints, first published in 2005. Learn more
Visiting the Progression of the LDRA Tool SuiteLDRA continues to develop and drive the market in automating software verification, requirements traceability and standards.  No matter the industry, Automotive, Military and Aerospace, Medical, Telecom, Industrial or Energy, LDRA provides its clients with software quality tools that automate code analysis for safety-critical and secure-critical applicationsLearn more
MISRA C in an ISO 26262 ContextFrom it’s inception, MISRA C has been inextricably linked to automotive functional safety requirements.  This was enshrined within ISO 26262, with MISRA C being a recommended approach… a relationship that has been renewed with the 2nd Edition.Learn more
Automotive Functional Safety (ISO 26262)- Safety Critical Software Design and Verification Functional safety is a very important aspect for many industries, and it has become a highly recommended practice for Safety & Security critical products development. ISO 26262 is the widely adopted process standard for the global Automotive industry. This can be achieved by the usage of certified tools for development and verification phases during the lifecycle.Learn more
Avoiding Unsafe and Insecure Complex SoftwareIn everyday language, the words “complex” and “complicated” are synonymous. A complex cake recipe is complicated. But in development circles, software complexity is more specifically concerned with the extent to which a system is difficult to comprehend, modify and test, and not the complication inherent in the function it is designed to fulfil. Two systems equivalent in functionality can therefore differ greatly in their software complexity.?And the more complex the code, the more difficult it is to understand, test and maintain, and the more likely it is that problems will arise.Learn more
Emerging Technology Trends – Skill Challenges & Opportunities for Industry & AcademiaThis webinar on Emerging Technology Trends focuses on the skill challenges and opportunities for Industry & Academia. The topic will be of great benefit to all academic and industry personnel responsible for training and skill identification in the embedded industry. Learn more
The MISRA myth busted: Design patterns, safety and securityWhen examined with a critical eye, the commonly held belief that security and safety critical code are hugely different to each other is a conundrum. Why would that be?Learn more
A Primer for Functional Safety for IEC 61508The adherence to the compliance and certification objectives dictated by functional safety and security standards like IEC 61508 pose multiple challenges for Industrial Control System suppliers. Conformance with domain and country-specific regulatory guidelines requires planning from the early stages of the product/project lifecycle. A lack of understanding of compliance objectives causes project delays and overruns, impacting resources, time and money; in extreme cases, perhaps resulting in punitive damages. This webinar would focus on Functional Safety with respect to IEC 61508, the de facto standard and the basis of other functional safety standards for multiple safety-critical domains. Learn more
Addressing the bi-directional traceability pain-point with LDRA and DOORS NGThere are some very good test tools around, and some very good requirements management tools. But all too often, there is little to interface the two. That wouldn’t be so bad if projects really followed the text book V-model so that project phases were perfectly aligned, such that requirements stayed fixed throughout the development lifecycle, design reflected the requirements perfectly, and implementation fulfilled the design precisely.Learn more
Accelerating the Path to Standards Compliance with TBmanager®Cost, schedule, and risks driven by safety and security critical standards compliance can be managed and mastered with TBmanager and the LDRA tool suite®Learn more
From Concept to Secure IoT Code with DOORS, Rhapsody, and LDRAIn this webinar we will show best practices in leveraging a secure requirements through development workflow for IoT devices.Learn more
Assured safety-critical model-based development with Rhapsody and LDRASafety-critical software development standards such as DO-178C (Aerospace), IEC 61508 (Industrial), ISO 26262 (Automotive), and IEC 62304 (Medical) are demanding traceable, consistent, maintainable, and well-tested code.Learn more
Safety Critical Product Design with Texas Instruments and LDRAThe objective of this interactive live webinar is to highlight the features and benefits of TI’s Hercules safety certified microcontrollers and LDRA’s software tools (the LDRA tool suite) for the development and certification of functional safety modules in any safety critical application.Learn more
LDRA tool suite® V9.0 - TBmanager® PreviewThis webinar will give an introduction and preview of this major new release of TBmanager and is part of the v9.0 webinar series.Learn more
LDRA tool suite® V9.0 - TBvision® PreviewThis webinar will give an introduction and preview of this major new release of TBvision and is part of the v9.0 webinar series.Learn more
LDRA tool suite® V9.0 Software PreviewThis webinar will give an introduction and preview of this major new release and is the first in the series of v9.0 webinars.Learn more
By Software Life Cycle
TopicDetails
GM’s Software Coding Standards for Software SuppliersFueled by more capable and lower cost processors and the increasing demands on functional safety, a better driver and passenger experience, economic efficiency, connectivity, and even autonomy, the complexity in the automobile is accelerating. Learn more
Automotive Panel - Jumpstarting Level 5 Autonomous Drive: Development Platforms and ConsiderationsWith the path to fully autonomous driving still up for debate, embedded automotive solutions providers have wasted no time bringing Level 5 autonomous vehicle development platforms to market. These integrated prototyping and design suites provide the software and/or hardware required to process, fuse, and manage camera, sensor, and network inputs, all within an acceptable automotive power envelope and designed to functional safety standards. What could be left to debate? Join this panel of automotive industry experts as they review considerations for integrating Level 5 Autonomous Drive technology into next-generation vehicles. Learn how to efficiently balance power consumption with processor load, conform to standards such as ISO 26262 and AUTOSAR, and leverage available tools to skip steps in the race towards fully autonomous vehicles.Learn more
Addressing the bi-directional traceability pain-point with LDRA and DOORS NGThere are some very good test tools around, and some very good requirements management tools. But all too often, there is little to interface the two. That wouldn’t be so bad if projects really followed the text book V-model so that project phases were perfectly aligned, such that requirements stayed fixed throughout the development lifecycle, design reflected the requirements perfectly, and implementation fulfilled the design precisely.Learn more
Design security into your code. Don’t just hope to remove insecurityThis webinar advocates that it is time for security critical software developers to embrace the sound engineering lifecycle advocated by functional safety standards, using traditional penetration and load tests to prove that the product is sound, rather than to highlight where it isn’t. Learn more
The Infinite Software Development Lifecycle of Connected Systems The emergence of the connected world means that requirements are subject to change both during development and after product release - whenever some smart Alec finds a new vulnerability. Automating bi-directional traceability from requirements through to design, code and test not only removes the headache from the adherence to functional safety standards. It guarantees the quick and effective management of responses to security issues in this new, connected world. Learn more
Connected Cars: Get Security in your ClutchesThe “connected car” has evolved from automobiles with basic Internet access capabilities to vehicles that are part of the very network fabric. Today’s connected car requires bi-directional communications with other vehicles, nearby infrastructure, and the cloud to enable advanced safety, optimum efficiency, and improved passenger experience. Learn more
Coding Standards for Security EnhancementThis webinar introduces the top 10 secure coding principles, and then focuses on one of those principles – namely, the application of a secure coding standard with its secure coding guidelines. It explains how such standards are designed to eliminate known vulnerabilities, and examines code snippets to provide examples of unspecified, implementation defined and runtime errors. Learn more
Best Practice in the Building of Secure SystemsThis webinar discusses the ideal properties of secure systems, and introduces the international standards pertinent to building them. It describes the need to incorporate security throughout the development lifecycle of a secure product, starting with security requirements and their interpretation in the product design and implementation. Learn more
Securing the Industrial Internet of Things: The Swiss Cheese ModelThe “Internet of Things” is a much used phrase. It promises a world of convenience, efficiency, and economic opportunity by embracing smart homes, connected medical devices, autonomous cars, manufacturing industry, and more besides. Learn more
Using fully-qualified tools to gain competitive advantage in the safety arenaIndustries such as automotive, medical, industrial and home automation are currently going through fundamental transformation with regards to their requirements for embedded electronic systems. There has been an explosive growth in both the number of processing units within each system and software complexity. At the same time, applications in these industries also must address the escalating concerns of functional safety and security.Learn more
Security Framework for Aerospace/Avionics SystemsFlight is widely regarded as the safest form of transportation. The aviation industry is justly proud of its enviable safety track record and the resulting high degree of public confidence, a happy situation resulting largely from the enforcement of stringent development processes and compliance requirements.Learn more
Understand Software Quality’s Three-Legged Stool: Static Analysis, Dynamic Analysis, and Unit TestingThe definition of quality code is evolving as demands for it increase. Reliable, safe coding practices have been widely adopted for applications such as medical, industrial, transportation, automotive, and aerospace where a software malfunction could cause injury or death. But current headlines make it clear that secure coding has become equally imperative, and for a much broader range of applications where hacking can result in damaged brands, misused information, and identity theft. While there are many ways to layer security into software, it is also easy to inadvertently introduce flaws that can result in safety or security vulnerabilities.Learn more
Understand Software Quality’s Three-Legged Stool: Static Analysis, Dynamic Analysis, and Unit TestingThe definition of quality code is evolving as demands for it increase. Reliable, safe coding practices have been widely adopted for applications such as medical, industrial, transportation, automotive, and aerospace where a software malfunction could cause injury or death. But current headlines make it clear that secure coding has become equally imperative, and for a much broader range of applications where hacking can result in damaged brands, misused information, and identity theft. While there are many ways to layer security into software, it is also easy to inadvertently introduce flaws that can result in safety or security vulnerabilities.Learn more
Protect the Weak Link in Embedded Systems with New MISRA C Security GuidelinesAs developers continue to add features to their products within already constrained budgets and schedules, software has become the weak link that allows malicious entities to gain access to sensitive data and take over systems. Even if devices aren’t considered safety-critical, the impact of their data being hacked can be devastating for the user and the manufacturer.Learn more
Software Security for the Connected CarIn 2012, the OnStar system built into GM vehicles was used at the request of police to shut down a stolen car as it was being pursued. This incident and others made it clear that if the police can break into a car, so can thieves and other hackers. And while connectivity and data are the currency of our age, capitalizing on them in the automotive sector comes with significant risk.Learn more
Unmanned Aircraft and Safety CertificationAutonomous aircraft -- from hand-thrown unmanned aerial vehicles (UAVs) to high-flying jet-powered platforms are close to being certified to fly in multiple sections of the national airspace.Learn more
Pragmatic Safety and Security-Critical Development in an IoT WorldIn reality, safety and security-critical development is “hard” and potentially very costly. There are many facets to developing a secure and ultimately safe system but it all starts with developing secure software.Learn more
Accelerating the Path to Standards Compliance with TBmanager®Cost, schedule, and risks driven by safety and security critical standards compliance can be managed and mastered with TBmanager and the LDRA tool suite®Learn more
Ensure Functionality, Safety, and Security with DOORS Next Generation and LDRATo ensure proper system functionality, safety, and security, traceability must be used for artifacts across the lifecycle. This includes requirements, design elements, source code, and tests. Key process standards such as DO-178B/C, ISO 26262, IEC 61508, IEC 62304 and others, mandate its use.Learn more
Securing the Internet of Things Begins with High-Quality CodeWith the massive proliferation of devices in the Internet of Things (IoT), security has become a primary concern across nearly every vertical market segment. Medical devices, industrial control equipment, unmanned systems, and automobiles can all be remotely controlled and monitored, providing new high-value capabilities—as well as opportunities for security breaches.Learn more
Best Practices in Software Testing of Embedded SystemsIn this webinar we will see how requirements based testing of low level requirements can reveal issues in an application. We’ll examine the details of how test cases can be modeled, executed and reviewed to identify potential issues. It is difficult to consistently produce safe and secure code. However, by following proven testing methodologies and using automated tools, the ability to build reliable applications, on time, is within our reach.Learn more
Don’t Be the Developer Whose Rocket Crashes on Lift-offSoftware development teams are facing conflicting demands for higher developer productivity along with quality and certification of safety- and security-critical software.Learn more
Pragmatic Safety and Security-Critical Development in an IoT WorldIn this session we will explore how to create safe and secure software from the ground up using traceability, static analysis, secure coding standards, and automated verification techniques.Learn more
Cyber security for the connected carWhile connectivity and data are the currency of our age, capitalizing on them in the automotive sector comes with significant risk.Learn more
Embedded Automotive Development - it takes an EcosystemSince first utilized in the late 1970’s, the digitization of the automobile has exploded. Cars have become ‘computers on wheels,’ with advanced sensor technology, smart mechatronic systems, multi-function infotainment, driver-configurable instrumentation, and continual connections to the Internet, other vehicles, and roadway infrastructures.Learn more
From Concept to Secure IoT Code with DOORS, Rhapsody, and LDRAIn this webinar we will show best practices in leveraging a secure requirements through development workflow for IoT devices.Learn more
Achieving Functional Safety with ARM’s DS-5 Development Studio and LDRA’s MISRA Compliance ToolsView this webinar to learn how the integration of LDRA’s MISRA compliance tool, LDRAlite™ for ARM® DS-5 software can shorten your path to software functional safety.Learn more
Solving Avionics Safety Certification Challenges in UAS PlatformsThe Federal Aviation Administration (FAA) continues to release new approvals for the use of unmanned aircraft in the national airspace and other nations are making similar moves.This E-cast of industry experts will discuss the challenges and solutions for managing avionics safety certification in unmanned aircraft.Learn more
Improving Embedded Software Security through Coding Standards Compliance and Structural Coverage AnalysisEnsuring the security of embedded devices involves more than simply using vulnerability preventive programming. However, paying attention to and leveraging security standards such as CWE/CVE, CERT C and even CERT Java, will certainly improve the probability of delivering a secure and effective system.Learn more
Which two will your team pick: High quality software, on time delivery or within budget?We will look at ways to bring relief to the industries with the greatest quality and security challenges - aerospace, automotive, medical, military and security. Using industry standards DO-178B, IEC 61508, IEC 62304 & ISO 26262 as a reference, we look at how best practices within these standards help meet software quality and security objectives.Learn more
Software Lifecycle Metrics; enabling Quality, Security and ProductivityThis webinar discusses how software development lifecycle metrics have been used successfully in safety- and mission-critical applications to yield significant improvements in software quality and security, while enhancing overall productivity.Learn more
Managing the risk of meeting Embedded Software Certification ObjectivesUsing practical examples, we remove the mystery and confusion surrounding development, verification, configuration management, quality assurance and risk management. We pay special attention to requirements traceability, coding standards adherence, independence criteria, testing and structural coverage analysis. Finally, we discuss how these can assist in the next generation of certification.Learn more
Accelerating Safety- & Security-Critical Embedded System Product Lifecycle DevelopmentThe objective of this live webinar is to discuss proven methodologies to reduce time to market for the development and certification of safety- and security-critical embedded system applications.Learn more
Accelerating Software Verification and Certification in an Agile EnvironmentThis webinar will specifically address how system simulation and software verification solutions can help software teams achieve the requirements of certification in aerospace, defense, automotive, industrial, and medical application development.Learn more
From the Model to the Target to CertificationThis webinar will cover verification criteria and goals regarding the increasing portion of embedded code that has been directly derived from models. This has been driven in part due to high fidelity modeling tools and code generation tools like Simulink and Embedded Coder from MathWorks.Learn more
Tracing Requirements through to Object Code VerificationThe webinar will explain the purpose of object code verification, highlight the nature of problems it can expose, and discuss how the management of requirements and their traceability can be extended right through to object code verification.Learn more
Minimising the cost of Regulatory ComplianceThis webinar aims to share the best practices of a pioneer and global leader in automated software verification, source code analysis, and test tools covering the full development lifecycle.Learn more
Building Secure Software WebinarThis webinar will look specifically at the best practices, knowledge and tools available for building secure software that is free from vulnerabilities.Learn more
Certified Software Validation Tools to Increase Software Reliability in Mission Critical Applications WebinarThis webinar will discuss certified software validation processes in the context of mission critical applications.Learn more
Achieve Better Programming Practices: Integrate Static and Dynamic Analysis WebinarIn this webinar we discuss: Why Static Analysis alone is not enough?, How Dynamic Analysis complements Static Analysis? and How static and dynamic analysis together improve your test and verification process?Learn more
Making sense of Software of Unknown Pedigree (SOUP) using the LDRA tool suite WebinarLDRA's webinar will illustrate how you can control and manage the development of SOUP to achieve a systematic and progressive approach to the introduction of new and more rigorous coding standards to prove software compliance.Learn more
By Industry/Standard
TopicDetails
GM’s Software Coding Standards for Software SuppliersFueled by more capable and lower cost processors and the increasing demands on functional safety, a better driver and passenger experience, economic efficiency, connectivity, and even autonomy, the complexity in the automobile is accelerating. Learn more
Automotive Panel - Jumpstarting Level 5 Autonomous Drive: Development Platforms and ConsiderationsWith the path to fully autonomous driving still up for debate, embedded automotive solutions providers have wasted no time bringing Level 5 autonomous vehicle development platforms to market. These integrated prototyping and design suites provide the software and/or hardware required to process, fuse, and manage camera, sensor, and network inputs, all within an acceptable automotive power envelope and designed to functional safety standards. What could be left to debate? Join this panel of automotive industry experts as they review considerations for integrating Level 5 Autonomous Drive technology into next-generation vehicles. Learn how to efficiently balance power consumption with processor load, conform to standards such as ISO 26262 and AUTOSAR, and leverage available tools to skip steps in the race towards fully autonomous vehicles.Learn more
The MISRA myth busted: Design patterns, safety and securityWhen examined with a critical eye, the commonly held belief that security and safety critical code are hugely different to each other is a conundrum. Why would that be?Learn more
High reliability systems: Dual modular redundancy, or very high software integrity levels? Dual modular redundancy (DMR) is a popular means of mitigating risks across the safety critical sectors, but in devices deploying any form of control logic it needs to be approached with caution. It may be more commercially viable to develop very high integrity software.Learn more
Leveraging LDRA to Help GM Suppliers Achieve Functional Safety and SecurityIn today's automotive market, there is no question that Functional Safety and Security are tightly coupled concerns and that automotive software suppliers must adhere to development standards such as ISO 26262, SAE J3061, MISRA, Autosar, and internal standards such as GMW-CG2999 to adequately address these concerns.Learn more
Design security into your code. Don’t just hope to remove insecurityThis webinar advocates that it is time for security critical software developers to embrace the sound engineering lifecycle advocated by functional safety standards, using traditional penetration and load tests to prove that the product is sound, rather than to highlight where it isn’t. Learn more
ISO 26262 Functional Safety Verification - Part 2This webinar series provides step-by-step guidelines for the assessment of ISO 26262 (part 6) which refers more specifically to the development of the software aspect of the product.Learn more
ISO 26262 Functional Safety Verification - Part 1This webinar series provides step-by-step guidelines for the assessment of ISO 26262 (part 6) which refers more specifically to the development of the software aspect of the product.Learn more
Achieve safety AND security with ISO 26262 complianceCompliance with the functional safety Standard ISO 26262 will never been easy. The advent of complementary cybersecurity guidelines in the form of SAE J3061 increases the burden for any development team up against budgetary requirements. Looking for a way to cope? Look no further. Learn from Andrew Banks, Chairman of the BSI “Software Testing” Working Group and an active contributor to the recent revision of ISO 26262. Learn more
Bi-directional Requirements: Turning the nightmare into a dreamWhen requirements are managed well, traceability can be established between each development phase. However, maintaining the resulting Requirements Traceability Matrix (RTM) is frequently an administrative nightmare. Learn how automating that process ensures that the matrix is always an up-to-date asset, rather than a labour-intensive burden.Learn more
Solving Avionics Safety Certification Challenges for Modern AircraftWhether it's a commercial passenger jet, a general aviation aircraft, a military fighter jet, or combat helicopter, avionics technology continues to get more and more sophisticated and relies increasingly on the latest commercial-off-the-shelf (COTS) hardware and software.Learn more
Security is Paramount in MedicalSecurity is generally at the top of the list of “must haves” for designers of medical devices. But what does that mean exactly? How secure is secure? Do you know the end environment where your device will be deployed? Are you sure?Learn more
Avionics Safety Certification Challenges with UAVsUnmanned aircraft, drones, remotely-piloted aircraft, or whatever one chooses to call them are increasing in number and often staying ahead of the regulatory bodies tasked with setting their safety standards.Learn more
Connected Cars: Get Security in your ClutchesThe “connected car” has evolved from automobiles with basic Internet access capabilities to vehicles that are part of the very network fabric. Today’s connected car requires bi-directional communications with other vehicles, nearby infrastructure, and the cloud to enable advanced safety, optimum efficiency, and improved passenger experience. Learn more
Best Practice in the Building of Secure SystemsThis webinar discusses the ideal properties of secure systems, and introduces the international standards pertinent to building them. It describes the need to incorporate security throughout the development lifecycle of a secure product, starting with security requirements and their interpretation in the product design and implementation. Learn more
Security Framework for Aerospace/Avionics SystemsFlight is widely regarded as the safest form of transportation. The aviation industry is justly proud of its enviable safety track record and the resulting high degree of public confidence, a happy situation resulting largely from the enforcement of stringent development processes and compliance requirements.Learn more
Sorting Out Sensors, Software, and Processing for Automotive Safety and Autonomous DriveActive safety systems (and eventually, autonomous vehicles) rely on a range of technologies to ensure safe, reliable operation, including radar ICs of various frequencies, LiDAR units, high-resolution 360º camera systems, and more. Powerful processors/electronics control units (ECUs) and sophisticated software algorithms are also required to fuse these data inputs in real-time so that drivers (and cars themselves) can make split-second decisions that could prevent accidents. Are all of these really necessary, and, if so, where does each of them fit?Learn more
Unmanned Aircraft and Safety CertificationAutonomous aircraft -- from hand-thrown unmanned aerial vehicles (UAVs) to high-flying jet-powered platforms are close to being certified to fly in multiple sections of the national airspace.Learn more
Road to Certification with LDRA and ARMSafety and security critical markets must adhere to strict certification requirements; this includes, coding standards, structural coverage analysis, unit testing and requirements traceability.Learn more
Ensure Functionality, Safety, and Security with DOORS Next Generation and LDRATo ensure proper system functionality, safety, and security, traceability must be used for artifacts across the lifecycle. This includes requirements, design elements, source code, and tests. Key process standards such as DO-178B/C, ISO 26262, IEC 61508, IEC 62304 and others, mandate its use.Learn more
Securing the Internet of Things Begins with High-Quality CodeWith the massive proliferation of devices in the Internet of Things (IoT), security has become a primary concern across nearly every vertical market segment. Medical devices, industrial control equipment, unmanned systems, and automobiles can all be remotely controlled and monitored, providing new high-value capabilities—as well as opportunities for security breaches.Learn more
Best Practices in Software Testing of Embedded SystemsIn this webinar we will see how requirements based testing of low level requirements can reveal issues in an application. We’ll examine the details of how test cases can be modeled, executed and reviewed to identify potential issues. It is difficult to consistently produce safe and secure code. However, by following proven testing methodologies and using automated tools, the ability to build reliable applications, on time, is within our reach.Learn more
Don’t Be the Developer Whose Rocket Crashes on Lift-offSoftware development teams are facing conflicting demands for higher developer productivity along with quality and certification of safety- and security-critical software.Learn more
Understanding Compliance – How to Leverage Technologies and Maximize Productivity in Aerospace ProgramsThis LCS webinar will elaborate on these compliance challenges for the aerospace supplier and introduce the case study technique that will ensure the cost effective achievement of certification goals and facilitate the utilization of advanced, highly productive technologies.Learn more
Protect the Weak Link in Embedded Systems with New MISRA C Security GuidelinesSecurity can no longer be an afterthought of development. With multiple well-publicised breaches, OEMs in the automotive and other industries are increasingly requiring developers to prove that their software meets the highest standards for security as well as safety.Learn more
Cyber security for the connected carWhile connectivity and data are the currency of our age, capitalizing on them in the automotive sector comes with significant risk.Learn more
Embedded Automotive Development - it takes an EcosystemSince first utilized in the late 1970’s, the digitization of the automobile has exploded. Cars have become ‘computers on wheels,’ with advanced sensor technology, smart mechatronic systems, multi-function infotainment, driver-configurable instrumentation, and continual connections to the Internet, other vehicles, and roadway infrastructures.Learn more
Solving Avionics Safety Certification Challenges in UAS PlatformsThe Federal Aviation Administration (FAA) continues to release new approvals for the use of unmanned aircraft in the national airspace and other nations are making similar moves.This E-cast of industry experts will discuss the challenges and solutions for managing avionics safety certification in unmanned aircraft.Learn more
Improving Embedded Software Security through Coding Standards Compliance and Structural Coverage AnalysisEnsuring the security of embedded devices involves more than simply using vulnerability preventive programming. However, paying attention to and leveraging security standards such as CWE/CVE, CERT C and even CERT Java, will certainly improve the probability of delivering a secure and effective system.Learn more
Securing the IoT?How in the world do we secure the IoT? Incredibly, the Internet of Things drives and even controls our daily lives. Mobile connections are everywhere and with those connections and the corresponding global access to both data and physical devices comes a tremendous security risk.Learn more
Future Airborne Capability Environment (FACE) and DO-178C – A Path and Methodology to Airworthy, Cost-Effective, Aviation SoftwareIn this Webinar, guest speaker Kirk Avery the FACE Technical Working Group Chair from Lockheed Martin will help us understand the requirements and goals of the FACE Technical Standard.Learn more
MISRA C:2012, Plenty of Good Reasons to ChangeIf you’re developing safety-critical applications, you can’t afford to take chances. But commercial pressures don’t go away just because you’re diligent. The latest version of the MISRA standard lets you take advantage of more C features while helping you mitigate risk for safety-critical automotive, medical, industrial or military/aerospace applications.Learn more
High Assurance Medical Device Software Traceability and Verification with DOORS and the LDRA tool suiteProcess standards such as IEC 62304 mandate that all requirements, design elements, source code, tests, and related artifacts be linked across the lifecycle. This ensures that the embedded software fulfils all system and functional safety requirements and meets compliance objectives.Learn more
Overcoming the Most Time-consuming DO-178C ObjectivesThis webinar will discuss methodologies, tools and subject matter expertise as means to achieve successful certifications for software suppliers.Learn more
Meeting Automotive ISO 26262 Objectives with Rhapsody and the LDRA tool suiteThis webinar will demonstrate how model-based development with Rhapsody can produce high quality code, traceable to requirements and adhering to industry or company-defined coding standards and complexity metrics.Learn more
Simplify Software Development for Functional Safety ApplicationsOur experts will show the functional safety software development process and how SafeTI Compliance Support Packages (CSPs) and LDRA validation tools can help you more quickly achieve system-level safety goals.Learn more
Utilizing traceability with DOORS and LDRA to ease regulatory complianceProcess standards such as DO-178B/C, ISO 26262, IEC 61508, IEC 62304 and others, mandate that all requirements, design elements, source code, tests, and related artifacts be linked across the lifecycle.Learn more
Ensuring Automotive Functional Safety with QNX and LDRAIn this webinar, we will discuss how suppliers can develop capable and safe software systems faster with an operating system specifically tuned for automotive safety, and development and verification tools proven to help produce safer, more robust systems, efficiently.Learn more
Safety Certification and Unmanned AircraftThis webcast of industry experts will discuss the challenges with meeting safety standards such as DO-178 B & C in unmanned aircraft and solutions for navigating safety certification effectively.Learn more
Why ISO 26262 Compliant?This webinar will examine what’s needed to demonstrate compliance to the ISO 26262 Functional Safety Standard. With ISO 26262, product safety life cycles are based on a risk-oriented approach determined by system and software Safety Integrity Levels (SILs).Learn more
Ensuring Medical Device Safety and Effectiveness under IEC 62304Starting with a brief overview of the internationally recognised standard, IEC 62304, LDRA will demonstrate how the application of software tools facilitate and fit the processes, activities, and tasks mandated by the standard, ultimately improving development efficiency and overall software quality.Learn more
Achieving Industrial Safety using IEC 61508This webinar will focus on IEC 61508 – Part 3 –Software Requirements, Design, implementation and Testing for E/E/PE systems and IEC 61508 – Part 7 - Overview of Techniques and Measures for Software Safety as discussed in Part 3.Learn more
Model-Based Design & Verification for DO-178C Using Simulink and the LDRA tool suiteIn this webinar learn how Model-Based Design and code verification technologies streamline flight software development for DO-178C, the FAA’s upcoming flight software certification standard.Learn more
Achieving Rail Safety Certification using EN 50128:2011This webinar will focus on EN 50128:2011 for Railway applications — Communications, signalling and processing systems — Software for railway control and protection systems.Learn more
A Practitioner's Guide to Critical Software CertificationUsing practical examples, we remove the mystery and confusion surrounding embedded systems development, lifecycle traceability, verification, reporting and quality assurance.Learn more
A Practitioner's Guide to Managing your Software Certification ObjectivesUsing practical examples, we remove the mystery and confusion surrounding development, verification, configuration management and quality assurance.Learn more
DO-178C/DO-331: Fast Track to Certification using Model-Based DesignThis webinar explores the conditions under which model verification can be re-used to satisfy EOC verification objectives using Simulink and LDRA tool suite, and it also identifies areas which should be closely attended to in order to satisfy the regulatory requirements.Learn more
Jointly hosted by LDRA and Green Hills Software - Achieving Road Vehicle Safety Certification using ISO 26262This webinar will concentrate on the Product Development phase, specifically Part 4 - System level and Part 6 - Software level of the ISO 26262 process. The focus will also be on achieving lifecycle traceability between sub-phases and the compatibility with system and hardware lifecycles by performing integration and system level verification.Learn more
Achieving Software Compliance for Medical DevicesStarting with a brief overview of new government standards such as IEC 62304, LDRA will show you how to manage your product development throughout the entire software development lifecycle.Learn more
Navigating DO-178B and DO-178C certification in Military Aircraft SystemsThis webinar willl highlight the processes, procedures and tools used to achieve avionics certification on the latest civil airliners.Learn more
Are you ready for DO-178C and Emerging Security-Critical Standards? WebinarThis webinar covers practical how-to strategies for managing software development for rigorous safety-critical standards, such as DO-178B and C, MISRA, FDA Type II/III, IEC 61508, CERT C and Homeland Securitys CWE up to the highest compliance levels.Learn more
Tips & Techniques for Developing Code to the Highest Safety-Critical Standards - DO-178B/C ... Remove the MysteryThis webinar covers technical tips and techniques for developing safety-critical avionics software in compliance with DO-178B (up to, and including, Level A design assurance).Learn more
By Coding Standard
TopicDetails
GM’s Software Coding Standards for Software SuppliersFueled by more capable and lower cost processors and the increasing demands on functional safety, a better driver and passenger experience, economic efficiency, connectivity, and even autonomy, the complexity in the automobile is accelerating. Learn more
Automotive Panel - Jumpstarting Level 5 Autonomous Drive: Development Platforms and ConsiderationsWith the path to fully autonomous driving still up for debate, embedded automotive solutions providers have wasted no time bringing Level 5 autonomous vehicle development platforms to market. These integrated prototyping and design suites provide the software and/or hardware required to process, fuse, and manage camera, sensor, and network inputs, all within an acceptable automotive power envelope and designed to functional safety standards. What could be left to debate? Join this panel of automotive industry experts as they review considerations for integrating Level 5 Autonomous Drive technology into next-generation vehicles. Learn how to efficiently balance power consumption with processor load, conform to standards such as ISO 26262 and AUTOSAR, and leverage available tools to skip steps in the race towards fully autonomous vehicles.Learn more
Automotive Development – Safety and Security Techniques and Tips to Ease CertificationIn this webcast, WITTENSTEIN high integrity systems and LDRA examine and illustrate techniques and tips to ease certification to ISO 26262, to comply to both safety and security requirements.Learn more
Don’t let your data taint your system securityThe CERT division of the Software Engineering Institute is a leader in cybersecurity. Of their top 10 secure coding practices, two focus on the sanitization of untrusted data – “Validate input” and “Sanitize data sent to other systems”.Learn more
Highly critical systems: How far can you trust your compiler?Verification and validation practices championed by functional safety, security and coding standards (including IEC 61508, ISO 26262, IEC 62304, MISRA C, CWE…) place considerable emphasis on showing how much of an application under test has been exercised. Experience has shown us that if code has been shown to perform correctly, then the probability of failure in the field is considerably lower. And yet almost without exception, the focus of this laudable endeavour is on the high level source code – whether that is written in C, C++, or whatever.Learn more
AUTOSAR Adaptive, AUTOSAR Classic, and Coding Standards: A Platform for SuccessIn December 2017, the AUTOSAR family of standards expanded to embrace the new “Adaptive Platform,” with the existing development branch now known as the “Classic Platform”. The Classic Platform is AUTOSAR’s established solution for embedded systems with hard real-time and safety constraints, first published in 2005. Learn more
MISRA C in an ISO 26262 ContextFrom it’s inception, MISRA C has been inextricably linked to automotive functional safety requirements.  This was enshrined within ISO 26262, with MISRA C being a recommended approach… a relationship that has been renewed with the 2nd Edition.Learn more
The MISRA myth busted: Design patterns, safety and securityWhen examined with a critical eye, the commonly held belief that security and safety critical code are hugely different to each other is a conundrum. Why would that be?Learn more
High reliability systems: Dual modular redundancy, or very high software integrity levels? Dual modular redundancy (DMR) is a popular means of mitigating risks across the safety critical sectors, but in devices deploying any form of control logic it needs to be approached with caution. It may be more commercially viable to develop very high integrity software.Learn more
Leveraging LDRA to Help GM Suppliers Achieve Functional Safety and SecurityIn today's automotive market, there is no question that Functional Safety and Security are tightly coupled concerns and that automotive software suppliers must adhere to development standards such as ISO 26262, SAE J3061, MISRA, Autosar, and internal standards such as GMW-CG2999 to adequately address these concerns.Learn more
Design security into your code. Don’t just hope to remove insecurityThis webinar advocates that it is time for security critical software developers to embrace the sound engineering lifecycle advocated by functional safety standards, using traditional penetration and load tests to prove that the product is sound, rather than to highlight where it isn’t. Learn more
The Infinite Software Development Lifecycle of Connected Systems The emergence of the connected world means that requirements are subject to change both during development and after product release - whenever some smart Alec finds a new vulnerability. Automating bi-directional traceability from requirements through to design, code and test not only removes the headache from the adherence to functional safety standards. It guarantees the quick and effective management of responses to security issues in this new, connected world. Learn more
Avionics Safety Certification Challenges with UAVsUnmanned aircraft, drones, remotely-piloted aircraft, or whatever one chooses to call them are increasing in number and often staying ahead of the regulatory bodies tasked with setting their safety standards.Learn more
Coding Standards for Security EnhancementThis webinar introduces the top 10 secure coding principles, and then focuses on one of those principles – namely, the application of a secure coding standard with its secure coding guidelines. It explains how such standards are designed to eliminate known vulnerabilities, and examines code snippets to provide examples of unspecified, implementation defined and runtime errors. Learn more
Using fully-qualified tools to gain competitive advantage in the safety arenaIndustries such as automotive, medical, industrial and home automation are currently going through fundamental transformation with regards to their requirements for embedded electronic systems. There has been an explosive growth in both the number of processing units within each system and software complexity. At the same time, applications in these industries also must address the escalating concerns of functional safety and security.Learn more
Understand Software Quality’s Three-Legged Stool: Static Analysis, Dynamic Analysis, and Unit TestingThe definition of quality code is evolving as demands for it increase. Reliable, safe coding practices have been widely adopted for applications such as medical, industrial, transportation, automotive, and aerospace where a software malfunction could cause injury or death. But current headlines make it clear that secure coding has become equally imperative, and for a much broader range of applications where hacking can result in damaged brands, misused information, and identity theft. While there are many ways to layer security into software, it is also easy to inadvertently introduce flaws that can result in safety or security vulnerabilities.Learn more
Protect the Weak Link in Embedded Systems with New MISRA C Security GuidelinesAs developers continue to add features to their products within already constrained budgets and schedules, software has become the weak link that allows malicious entities to gain access to sensitive data and take over systems. Even if devices aren’t considered safety-critical, the impact of their data being hacked can be devastating for the user and the manufacturer.Learn more
Pragmatic Safety and Security-Critical Development in an IoT WorldIn reality, safety and security-critical development is “hard” and potentially very costly. There are many facets to developing a secure and ultimately safe system but it all starts with developing secure software.Learn more
Road to Certification with LDRA and ARMSafety and security critical markets must adhere to strict certification requirements; this includes, coding standards, structural coverage analysis, unit testing and requirements traceability.Learn more
Accelerating the Path to Standards Compliance with TBmanager®Cost, schedule, and risks driven by safety and security critical standards compliance can be managed and mastered with TBmanager and the LDRA tool suite®Learn more
Ensure Functionality, Safety, and Security with DOORS Next Generation and LDRATo ensure proper system functionality, safety, and security, traceability must be used for artifacts across the lifecycle. This includes requirements, design elements, source code, and tests. Key process standards such as DO-178B/C, ISO 26262, IEC 61508, IEC 62304 and others, mandate its use.Learn more
Securing the Internet of Things Begins with High-Quality CodeWith the massive proliferation of devices in the Internet of Things (IoT), security has become a primary concern across nearly every vertical market segment. Medical devices, industrial control equipment, unmanned systems, and automobiles can all be remotely controlled and monitored, providing new high-value capabilities—as well as opportunities for security breaches.Learn more
Protect the Weak Link in Embedded Systems with New MISRA C Security GuidelinesSecurity can no longer be an afterthought of development. With multiple well-publicised breaches, OEMs in the automotive and other industries are increasingly requiring developers to prove that their software meets the highest standards for security as well as safety.Learn more
Embedded Automotive Development - it takes an EcosystemSince first utilized in the late 1970’s, the digitization of the automobile has exploded. Cars have become ‘computers on wheels,’ with advanced sensor technology, smart mechatronic systems, multi-function infotainment, driver-configurable instrumentation, and continual connections to the Internet, other vehicles, and roadway infrastructures.Learn more
Achieving Functional Safety with ARM’s DS-5 Development Studio and LDRA’s MISRA Compliance ToolsView this webinar to learn how the integration of LDRA’s MISRA compliance tool, LDRAlite™ for ARM® DS-5 software can shorten your path to software functional safety.Learn more
Improving Embedded Software Security through Coding Standards Compliance and Structural Coverage AnalysisEnsuring the security of embedded devices involves more than simply using vulnerability preventive programming. However, paying attention to and leveraging security standards such as CWE/CVE, CERT C and even CERT Java, will certainly improve the probability of delivering a secure and effective system.Learn more
MISRA C:2012, Plenty of Good Reasons to ChangeThe latest version of the MISRA standard lets you take advantage of more C features while helping you mitigate risk for safety-critical automotive, medical, industrial or military/aerospace applications.Learn more
Have Your Cake and Eat It, Too – With MISRA C:2012You will learn: How the new standard can help you make better decisions about the use of popular programming language features, How MISRA C:2012 provides backwards compatibility to protect legacy code, How the introduction of “decidable and undecideable” proscriptive rules will help focus your test efforts and The effect of introducing support for C99 on the MISRA C:2012 standard.Learn more
Improving Embedded Software Security through Coding Standards Compliance and Structural Coverage AnalysisThis webinar will focus on embedded software security covering: Vulnerability and security flaws, Software development with security coding standards, Verification and traceability of security requirements.Learn more
What You DON’T Know Can Hurt You: What you NEED to know about MISRA C:2012You will learn: How the new standard can help you make better decisions about the use of popular programming language features, How MISRA C:2012 provides backwards compatibility to protect legacy code, How the introduction of “decidable and undecideable” proscriptive rules will help focus your test efforts and The effect of introducing support for C99 on the MISRA C:2012 standard.Learn more
Certification Regulatory Services
TopicDetails
GM’s Software Coding Standards for Software SuppliersFueled by more capable and lower cost processors and the increasing demands on functional safety, a better driver and passenger experience, economic efficiency, connectivity, and even autonomy, the complexity in the automobile is accelerating. Learn more
Automotive Panel - Jumpstarting Level 5 Autonomous Drive: Development Platforms and ConsiderationsWith the path to fully autonomous driving still up for debate, embedded automotive solutions providers have wasted no time bringing Level 5 autonomous vehicle development platforms to market. These integrated prototyping and design suites provide the software and/or hardware required to process, fuse, and manage camera, sensor, and network inputs, all within an acceptable automotive power envelope and designed to functional safety standards. What could be left to debate? Join this panel of automotive industry experts as they review considerations for integrating Level 5 Autonomous Drive technology into next-generation vehicles. Learn how to efficiently balance power consumption with processor load, conform to standards such as ISO 26262 and AUTOSAR, and leverage available tools to skip steps in the race towards fully autonomous vehicles.Learn more
Design security into your code. Don’t just hope to remove insecurityThis webinar advocates that it is time for security critical software developers to embrace the sound engineering lifecycle advocated by functional safety standards, using traditional penetration and load tests to prove that the product is sound, rather than to highlight where it isn’t. Learn more
The Infinite Software Development Lifecycle of Connected Systems The emergence of the connected world means that requirements are subject to change both during development and after product release - whenever some smart Alec finds a new vulnerability. Automating bi-directional traceability from requirements through to design, code and test not only removes the headache from the adherence to functional safety standards. It guarantees the quick and effective management of responses to security issues in this new, connected world. Learn more
Solving Avionics Safety Certification Challenges for Modern AircraftWhether it's a commercial passenger jet, a general aviation aircraft, a military fighter jet, or combat helicopter, avionics technology continues to get more and more sophisticated and relies increasingly on the latest commercial-off-the-shelf (COTS) hardware and software.Learn more
Security is Paramount in MedicalSecurity is generally at the top of the list of “must haves” for designers of medical devices. But what does that mean exactly? How secure is secure? Do you know the end environment where your device will be deployed? Are you sure?Learn more
Avionics Safety Certification Challenges with UAVsUnmanned aircraft, drones, remotely-piloted aircraft, or whatever one chooses to call them are increasing in number and often staying ahead of the regulatory bodies tasked with setting their safety standards.Learn more
Connected Cars: Get Security in your ClutchesThe “connected car” has evolved from automobiles with basic Internet access capabilities to vehicles that are part of the very network fabric. Today’s connected car requires bi-directional communications with other vehicles, nearby infrastructure, and the cloud to enable advanced safety, optimum efficiency, and improved passenger experience. Learn more
Best Practice in the Building of Secure SystemsThis webinar discusses the ideal properties of secure systems, and introduces the international standards pertinent to building them. It describes the need to incorporate security throughout the development lifecycle of a secure product, starting with security requirements and their interpretation in the product design and implementation. Learn more
Securing the Industrial Internet of Things: The Swiss Cheese ModelThe “Internet of Things” is a much used phrase. It promises a world of convenience, efficiency, and economic opportunity by embracing smart homes, connected medical devices, autonomous cars, manufacturing industry, and more besides. Learn more
Using fully-qualified tools to gain competitive advantage in the safety arenaIndustries such as automotive, medical, industrial and home automation are currently going through fundamental transformation with regards to their requirements for embedded electronic systems. There has been an explosive growth in both the number of processing units within each system and software complexity. At the same time, applications in these industries also must address the escalating concerns of functional safety and security.Learn more
Security Framework for Aerospace/Avionics SystemsFlight is widely regarded as the safest form of transportation. The aviation industry is justly proud of its enviable safety track record and the resulting high degree of public confidence, a happy situation resulting largely from the enforcement of stringent development processes and compliance requirements.Learn more
Sorting Out Sensors, Software, and Processing for Automotive Safety and Autonomous DriveActive safety systems (and eventually, autonomous vehicles) rely on a range of technologies to ensure safe, reliable operation, including radar ICs of various frequencies, LiDAR units, high-resolution 360º camera systems, and more. Powerful processors/electronics control units (ECUs) and sophisticated software algorithms are also required to fuse these data inputs in real-time so that drivers (and cars themselves) can make split-second decisions that could prevent accidents. Are all of these really necessary, and, if so, where does each of them fit?Learn more
Software Security for the Connected CarIn 2012, the OnStar system built into GM vehicles was used at the request of police to shut down a stolen car as it was being pursued. This incident and others made it clear that if the police can break into a car, so can thieves and other hackers. And while connectivity and data are the currency of our age, capitalizing on them in the automotive sector comes with significant risk.Learn more
Unmanned Aircraft and Safety CertificationAutonomous aircraft -- from hand-thrown unmanned aerial vehicles (UAVs) to high-flying jet-powered platforms are close to being certified to fly in multiple sections of the national airspace.Learn more
Pragmatic Safety and Security-Critical Development in an IoT WorldIn reality, safety and security-critical development is “hard” and potentially very costly. There are many facets to developing a secure and ultimately safe system but it all starts with developing secure software.Learn more
Road to Certification with LDRA and ARMSafety and security critical markets must adhere to strict certification requirements; this includes, coding standards, structural coverage analysis, unit testing and requirements traceability.Learn more
Accelerating the Path to Standards Compliance with TBmanager®Cost, schedule, and risks driven by safety and security critical standards compliance can be managed and mastered with TBmanager and the LDRA tool suite®Learn more
Ensure Functionality, Safety, and Security with DOORS Next Generation and LDRATo ensure proper system functionality, safety, and security, traceability must be used for artifacts across the lifecycle. This includes requirements, design elements, source code, and tests. Key process standards such as DO-178B/C, ISO 26262, IEC 61508, IEC 62304 and others, mandate its use.Learn more
Best Practices in Software Testing of Embedded SystemsIn this webinar we will see how requirements based testing of low level requirements can reveal issues in an application. We’ll examine the details of how test cases can be modeled, executed and reviewed to identify potential issues. It is difficult to consistently produce safe and secure code. However, by following proven testing methodologies and using automated tools, the ability to build reliable applications, on time, is within our reach.Learn more
Pragmatic Safety and Security-Critical Development in an IoT WorldIn this session we will explore how to create safe and secure software from the ground up using traceability, static analysis, secure coding standards, and automated verification techniques.Learn more
Understanding Compliance – How to Leverage Technologies and Maximize Productivity in Aerospace ProgramsThis LCS webinar will elaborate on these compliance challenges for the aerospace supplier and introduce the case study technique that will ensure the cost effective achievement of certification goals and facilitate the utilization of advanced, highly productive technologies.Learn more
Cyber security for the connected carWhile connectivity and data are the currency of our age, capitalizing on them in the automotive sector comes with significant risk.Learn more
From Concept to Secure IoT Code with DOORS, Rhapsody, and LDRAIn this webinar we will show best practices in leveraging a secure requirements through development workflow for IoT devices.Learn more
Achieving Functional Safety with ARM’s DS-5 Development Studio and LDRA’s MISRA Compliance ToolsView this webinar to learn how the integration of LDRA’s MISRA compliance tool, LDRAlite™ for ARM® DS-5 software can shorten your path to software functional safety.Learn more
Solving Avionics Safety Certification Challenges in UAS PlatformsThe Federal Aviation Administration (FAA) continues to release new approvals for the use of unmanned aircraft in the national airspace and other nations are making similar moves.This E-cast of industry experts will discuss the challenges and solutions for managing avionics safety certification in unmanned aircraft.Learn more
Simplifing Aircraft System CertificationThis LDRA Certification Services webinar will focus on Aircraft System and Line Replaceable Unit suppliers that must meet system-level requirements. Such suppliers face the significant challenges of complying with complex system (ARP 4754A) and safety (ARP 4761) standards as well as the environmental testing standard, DO-160.Learn more
Achieving FAA/EASA Compliance On Time and Under BudgetJoin LCS and Aeroconseil, experts from the FAA and EASA regulatory domains, respectively, as they present a very cost-effective and unified approach to ARP 4754A, DO-178C and DO-254 compliance.Learn more
8 Key Aspects of ED-12C/DO-178C ComplianceWe will summarise the guidance behind each of these aspects and present specific techniques that facilitate industry’s responsibility for compliance. Using the expertise of FAA Designated Engineering Representatives (DER’s), we will also present current guidance related to the regulatory community’s responsibility compliance.Learn more
10 Keys to FAA and EASA Certification SuccessThis LDRA Certification Services (LCS) webinar will examine 10 keys to success, both technical and business related, for DO-178C, DO-254 and ARP 4754A certification applicants.Learn more
Catch Software Errors Before It’s Too Late for CertificationWhat you'll learn from this webinar: How to simplify code analysis, test and certification for resource constrained applications, How to quickly assess the impact of identified failures and unexpected results and How to use automated testing processes and methodologies to achieve certifiable, high-quality systems.Learn more
Verification Techniques that Improve Code Quality, Developer Productivity, and Enable Certification/QualificationIn this presentation, we will review verification criteria for both hand-written and automatically generated embedded code. We will discuss target verification tools, techniques, and services for languages ranging from C/C++, Java, Ada and Assembler that ensure embedded code matches the design and satisfies requirements, even in highly iterative or agile development environments.Learn more