Showing 25 - 35 of 35
Considering the Role of Hardware in Securing OS and Hypervisor Operation

Considering the Role of Hardware in Securing OS and Hypervisor Operation

This white paper by David Sheets explores the role that hardware plays in ensuring the security of operating systems (OS) and hypervisors.

11/28/2018
A Matter of Trust: Reducing Program Risk with Dependable Solutions

A Matter of Trust: Reducing Program Risk with Dependable Solutions

Tactical advantage on the battlefield of the future will be based on trust and personnel will need a higher level of trust that all systems will work as needed in any situation.

10/23/2018
Trusted Boot

Trusted Boot

This white paper looks at Trusted Boot, a key strategy for ensuring that the trustworthiness of an embedded system begins with the very first software instruction at system startup in order to protect against attacks.

09/06/2018
Introduction to COTS-based Trusted Computing

Introduction to COTS-based Trusted Computing

This white paper looks at the use of open standards-based commercial-off-the-shelf (COTS) technologies to address Trusted Computing requirements in deployable embedded systems for aerospace and defense applications.

08/15/2018
Getting Secure, Intel-Based Solutions to Market Faster - Why the Hardware Vendor’s Boot Security Implementation Is So Important

Getting Secure, Intel-Based Solutions to Market Faster - Why the Hardware Vendor’s Boot Security Implementation Is So Important

This white paper looks at how solutions with the required boot security features built-in can reduce risks and get secure products to market faster.

06/27/2018
Reducing Risk and Accelerating Time to Market With Turret Aiming and Stabilization

Reducing Risk and Accelerating Time to Market With Turret Aiming and Stabilization

When each component in the drive system is purpose-built for aiming and stabilization, integrated by experienced engineers, and proven in numerous field applications, system integrators can rest easy knowing their solutions will meet performance requirements

04/19/2018
The Many Faces of Trusted Computing

The Many Faces of Trusted Computing

Defense and aerospace systems may be exposed to many security threats before, during, and after deployment. As a result, every system needs the right level of protection to ensure that it cannot be hacked or expose sensitive information.

01/10/2018
The Root of Trust: A Foundation for Trusted Computing

The Root of Trust: A Foundation for Trusted Computing

Steve Edwards looks at the growing demand for trusted computing solutions with effective protections against cyberattacks in the global defense electronics market.

07/13/2017
Data Protection with the NXP QorIQ Platform Trust Architecture

Data Protection with the NXP QorIQ Platform Trust Architecture

This white paper presents an overview of the potential threats to an embedded system, and how the Trust Architecture can effectively defend against these threats.

06/23/2017
TrustedCOTS: Leading the Way to Secure Systems

TrustedCOTS: Leading the Way to Secure Systems

This white paper highlights the capabilities that Curtiss-Wright has established to protect the leading-edge deployed systems developed by our customers.

02/08/2017

Getting Secure, Intel-Based Solutions to Market Faster White Paper

Why the Hardware Vendor’s Boot Security Implementation Is So Important.