Showing 37 - 48 of 60
The Impact of Protecting I/O Interfaces on System Performance

The Impact of Protecting I/O Interfaces on System Performance

A trusted computing system can ensure security at the potentially vulnerable entry points of system interfaces, yet this may compromise performance through design trade-offs that systems designers must compensate for.

06/11/2019
Machine Learning and Artificial Intelligence in Defense and Aerospace Applications - What You Need to Know

Machine Learning and Artificial Intelligence in Defense and Aerospace Applications - What You Need to Know

This white paper discusses the terminology, applications, challenges, and technology enablers for machine learning, deep learning, and artificial intelligence (AI) in the embedded computing market.

05/29/2019
Developing a Secure COTS-Based Trusted Computing System

Developing a Secure COTS-Based Trusted Computing System

System-level security is more than simply the sum of its parts. Read about key protections that must be considered when developing a secure COTS-based Trusted Computing system.

03/29/2019
Ground Vehicle Modernization with VICTORY and GVA

Ground Vehicle Modernization with VICTORY and GVA

Read about key similarities and differences between GVA and VICTORY and the benefits of using such frameworks in land vehicle upgrades and new builds.

03/06/2019
Measuring Techniques and Challenges of Moving to Variable Frequency Power

Measuring Techniques and Challenges of Moving to Variable Frequency Power

This white paper describes the move from constant to variable frequency power (VFP) systems and how these can be monitored using equipment designed to meet the ISO 12384 VFP standard.

02/28/2019
Application Development, Testing, and Analysis for Optimal Security

Trusted Computing White Paper: Application Development, Testing, and Analysis for Optimal Security

We explore securing data transfer, performing testing, and leveraging existing processor features for trusted and secure application software.

02/21/2019
Beyond Trusted Computing

Beyond Trusted Computing

Read the white paper by Curtiss-Wright TCOTS experts and learn about our holistic approach to Trusted Computing that applies rigorous protection standards at every stage of the development process.

12/12/2018
Latency: Understanding Delays in Embedded Networks

Latency: Understanding Delays in Embedded Networks

Andrew McCoubrey explores the causes of latency in embedded Ethernet networks and how networking features can be used to manage and reduce it.

11/30/2018
Considering the Role of Hardware in Securing OS and Hypervisor Operation

Considering the Role of Hardware in Securing OS and Hypervisor Operation

This white paper by David Sheets explores the role that hardware plays in ensuring the security of operating systems (OS) and hypervisors.

11/28/2018
High Speed Signal Integrity Capabilities

High Speed Signal Integrity Capabilities

Ivan Straznicky and Luke Falconer look at the implementation of high-speed serial fabric signaling on VPX/OpenVPX platforms.

10/31/2018
A Matter of Trust: Reducing Program Risk with Dependable Solutions

A Matter of Trust: Reducing Program Risk with Dependable Solutions

Tactical advantage on the battlefield of the future will be based on trust and personnel will need a higher level of trust that all systems will work as needed in any situation.

10/23/2018
Trusted Boot

Trusted Boot

This white paper looks at Trusted Boot, a key strategy for ensuring that the trustworthiness of an embedded system begins with the very first software instruction at system startup in order to protect against attacks.

09/06/2018