Trusted Computing

ID 357048490 © Andrey Popov | Dreamstime.com
Cyber technology operator monitoring surveillance cameras in military control center.
Trusted Computing

Four companies tapped to use artificial intelligence (AI) to find and fix cyber security vulnerabilities

Feb. 11, 2025
INGOTS aims to harden systems against exploit chains by identifying and fixing these vulnerabilities before attackers can capitalize on them.
ID 93297972 © Leowolfert | Dreamstime.com
DARPA wants resilient hardware, cyber-physical systems, and software without exploitable vulnerabilities for existing and future military systems.
Computers

Military researchers ask industry's advice on trusted computing approaches to ensure predictable behavior

Feb. 4, 2025
DARPA request for information asks for feedback on the emerging Formal Methods to Deliver Resilient Systems (FMDRS) -- also called the FMDRS Guide.
The Curtiss-Wright HSDR-2512 high-speed, high-capacity Ethernet data recorder is for demanding flight test programs.
Computers

High-speed Ethernet data recorder for use in demanding flight test programs introduced by Curtiss-Wright

The HSDR-2512 recorder supports full line-rate data capture on its 12 10 Gigabit Ethernet inputs to deliver 16.5 gigabytes per second write speed.
SYSGO's ELinOS Linux software development has trusted computing cyber security encryption features
Computers

Trusted computing encryption and cyber security for Linux embedded computing software introduced by SYSGO

Jan. 29, 2025
The decryption keys are stored and retrieved securely from the TPM during system boot. TPM also includes tools to manage board-specific devices.
ID 13103361 © Natalia Siverina | Dreamstime.com
Red-C envisions on-system detection and repair of cyber attacks, and would implement this capability on current bus-based hardware via firmware updates.
Trusted Computing

Military researchers eye future project for on-system cyber security in bus-based embedded computing

Jan. 28, 2025
Red-C envisions a distributed approach to on-system detection and repair of cyber attacks, implemented on bus-based hardware via firmware updates.