CIO Influence
CIO Influence News Networking Security

TrustInSoft Mathematically Guarantees Zero-Bug Mobile Applications with New Application Security Test

TrustInSoft Mathematically Guarantees Zero-Bug Mobile Applications with New Application Security Test
Bye, bye Pegasus: the new offer allows mobile app developers to prove the absence of vulnerabilities in C and C++ code, libraries, and APIs

Cybersecurity software company TrustInSoft announced a new offer for mobile app developers to prove the immunity of their code to cyber threats, in the wake of recent events involving Pegasus software. This latest application security test (AST) leverages TrustInSoft Analyzer, an exhaustive code analyzer powered by the latest advancements in formal methods, to prove the absence of bugs in APIs and libraries often used in complex mobile application backends.

TrustInSoft’s AST comes at a time when mobile application security is being called into question, with the resurgence of spyware software Pegasus and its alleged hacks. Such attacks typically exploit a vulnerability in a program’s source code, which often serves as the entry point for remote code execution, permitting the attacker to gain full control of a program. This was the case in 2018 when WhatsApp was hacked using a source code vulnerability called buffer overflow, which could have been prevented with thorough source code analysis. TrustInSoft’s latest AST provides assurance to developers that the APIs and libraries used in their application are vulnerability-free and immune from similar zero-day exploits.

Recommended ITech News: 1010data In New Collaboration with Moody’s Analytics

The new AST relies on formal methods: mathematical approaches that allow developers to prove the immunity of their source code to cyberattacks that exploit code vulnerabilities.  TrustInSoft’s solution offers an accessible, easy-to-use technology whose exhaustive approach detects 100% of undefined behaviors and reduces code verification time by 4x.

Fabrice Derepas, TrustInSoft’s CEO, stated,  “The mobile applications we use every day are as vulnerable to subtle and dangerous cyberattacks as any software. Formal methods can help harden the source code of APIs and libraries used in these applications to avoid vulnerabilities like those found in WhatsApp, before they can become exploitable.”

Recommended ITech News: Proximie Selects 8×8 Call and Video Quality Performance Monitoring to Enhance Future of Surgical Healthcare

Related posts

CoreWeave Expands Data Center Footprint with Two New Flexential Colocation Facilities

PR Newswire

Progress Announces Availability of Connectors with AWS Glue in AWS Marketplace

CIO Influence News Desk

CounterCraft Selected to Participate in First AWS Defence Accelerator for Startups

CIO Influence News Desk

Leave a Comment