Showing 37 - 48 of 63
Developing a Secure COTS-Based Trusted Computing System

Developing a Secure COTS-Based Trusted Computing System

System-level security is more than simply the sum of its parts. Read about key protections that must be considered when developing a secure COTS-based Trusted Computing system.

03/29/2019
Application Development, Testing, and Analysis for Optimal Security

Trusted Computing White Paper: Application Development, Testing, and Analysis for Optimal Security

We explore securing data transfer, performing testing, and leveraging existing processor features for trusted and secure application software.

02/21/2019
Building a Truly Trusted Computing Solution with COTS Hardware and Intel Security Capabilities

Building a Truly Trusted Computing Solution with COTS Hardware and Intel Security Capabilities

A manufacturer of secure aerospace & defense systems sought a COTS SBC with a robust & proven security profile for its new Trusted Computing solution.

01/22/2019
Beyond Trusted Computing

Beyond Trusted Computing

Read the white paper by Curtiss-Wright TCOTS experts and learn about our holistic approach to Trusted Computing that applies rigorous protection standards at every stage of the development process.

12/12/2018
Considering the Role of Hardware in Securing OS and Hypervisor Operation

Considering the Role of Hardware in Securing OS and Hypervisor Operation

This white paper by David Sheets explores the role that hardware plays in ensuring the security of operating systems (OS) and hypervisors.

11/28/2018
High Speed Signal Integrity Capabilities

High Speed Signal Integrity Capabilities

Ivan Straznicky and Luke Falconer look at the implementation of high-speed serial fabric signaling on VPX/OpenVPX platforms.

10/31/2018
Trusted Boot

Trusted Boot

This white paper looks at Trusted Boot, a key strategy for ensuring that the trustworthiness of an embedded system begins with the very first software instruction at system startup in order to protect against attacks.

09/06/2018
Introduction to COTS-based Trusted Computing

Introduction to COTS-based Trusted Computing

This white paper looks at the use of open standards-based commercial-off-the-shelf (COTS) technologies to address Trusted Computing requirements in deployable embedded systems for aerospace and defense applications.

08/15/2018
Getting Secure, Intel-Based Solutions to Market Faster - Why the Hardware Vendor’s Boot Security Implementation Is So Important

Getting Secure, Intel-Based Solutions to Market Faster - Why the Hardware Vendor’s Boot Security Implementation Is So Important

This white paper looks at how solutions with the required boot security features built-in can reduce risks and get secure products to market faster.

06/27/2018
Finding a Path Through the Woods: Choosing a Parallelization Technique

Finding a Path Through the Woods: Choosing a Parallelization Technique

In this white paper, Tammy Carter explores the options available in choosing the right parallelization technique.

06/01/2018
White Paper: Reducing Integration Headaches with Ground Vehicle Optimized Displays

Reducing Integration Headaches with Ground Vehicle Optimized Displays

The modern battlefield requires real-time information, voice communication, video, and data to increase combat effectiveness and warfighter safety. This white paper looks at how rugged COTS displays can meet varied mission requirements.

01/12/2018
The Many Faces of Trusted Computing

The Many Faces of Trusted Computing

Defense and aerospace systems may be exposed to many security threats before, during, and after deployment. As a result, every system needs the right level of protection to ensure that it cannot be hacked or expose sensitive information.

01/10/2018