View, browse and sort the list of sessions by Pass Type, Track, Day/Time, or by Speaker. Sessions are subject to change. Seating is on a first-come, first-served basis. Please arrive early to ensure you get a seat.
Build your conference agenda today! By signing up for the Scheduler, you can add sessions to your "Favorites" and develop your own personalized schedule. This personalized schedule will be synced with the official Arm TechCon Event App.
The same attributes that make code safe also make it secure, making MISRA C:2012 equally applicable to safety and security critical applications, underlined by the release of MISRA C:2012 – Addendum 2.
This presentation will discuss how MISRA C:2012 has always targeted both safety and security, contrasting CERT C's application centric detection of issues with MISRA's use of design patterns to prevent their introduction.
In conclusion, it will describe how the majority of MISRA rules lend themselves to automated checking of these security and safety issues, and how there are established tools and techniques that lend themselves admirably to it.
MISRA C:2012 is often perceived to be useful only for safety critical applications. However, for the most part, the same attributes that make code safe also make it secure making it equally applicable to security critical applications. The release of MISRA C:2012 – Addendum 2 reinforces and underlines that position.