Embedded System Security

MATLAB, Simulink, and Polyspace for Embedded System Security

Build and maintain secure products with Model-Based Design

MATLAB, Simulink, and Polyspace help to protect your systems and data from adverse external events. You can use these products for your cybersecurity practices to prevent operational, financial, safety, and privacy attacks from impacting system users.

With MATLAB, Simulink, and Polyspace you can design and maintain secure embedded systems. These products enable you to:

  • Build security into your system
  • Verify the effectiveness of your security architecture
  • Identify potential vulnerabilities early in the software development life cycle
  • Use analytic methods to increase the confidence in your design
  • Develop updates in response to new threats

Manage Cybersecurity Goals with Full Traceability

Capture your system-level security architecture, and allocate your security goals. Author and manage requirements together with your architecture, designs, generated code, and test artifacts. The digital thread from requirements to implementation lets you keep your design consistent and identify implementation or testing gaps (22:25). Quickly understand the impact of a design change and generate verification and validation reports for audits.

Secure Modeling and Code Generation

Run early checks on your model to avoid blocks that conflict with security goals and set up the code generator for maximum compliance levels. Find and fix vulnerabilities early with formal methods, before code is generated. Deploy and update your implementation with efficient and secure code generation.

Analyze Your Code for Vulnerabilities and Compliance Issues

Assess the security of your C/C++ source code without relying on human experts and code reviews. With Static Application Security Testing (SAST), developers can check compliance to the latest secure coding standards (CERT® C and CERT C++) and avoid weak patterns (CWEs) early during the software development life cycle. Extended security checks can spot tainted data, incorrect use of cryptographic libraries, and confidentiality issues. Analyze the robustness of your software and prove the absence of critical vulnerabilities with code analysis based on formal methods.

Explore Products

Assess Vulnerabilities

Model and simulate attacks on your system without requiring the hardware. Determine the impact of identified vulnerabilities with Model Slicer and easily identify affected functionalities. Run automatic hardware-in-the-loop (HIL) tests to observe the effects of specific inputs on your system.

Add Countermeasures

Prevent and mitigate potential vulnerabilities with robust design, state-of-the-art detection mechanisms, and security controls. Learn how to apply machine learning to implement an intrusion detection system (IDS) against spoofing. Leverage neural networks to enhance the robustness of image classification algorithms against adversarial attacks.

Compliance to Industry Standards

Automate verification of models and code to fulfill requirements from cybersecurity standards such as ISO/SAE 21434, IEC-26443, and DO-326. The IEC Certification Kit provides an overview on how to apply MATLAB, Simulink, Polyspace, and add-on products to ISO/SAE 21434, in addition to functional safety standards (ISO26262, IEC 61508). The kit helps you to build and qualify your development process for safe and secure embedded systems.

Automate Security Checks

Automate your processes to ensure consistent and efficient security checks throughout development and operations. Set up a CI pipeline for your models to automatically test changes and generate secure code. Frequently scan your code base for vulnerabilities, on every commit (15:32), and generate compliance reports.

Illustration of the DevOps loop.