Breadcrumb
- Home
- Capabilities
- Technologies
- Security
- TrustedCOTS Technology Protection
Trusted Computing for Embedded Processor Cards
The threats facing today’s defense and aerospace applications are more varied and sophisticated than ever. Embedded electronics require enhanced trusted computing protections to defend mission success from compromise from physical and remote attacks and hardware and software failures.
Curtiss-Wright builds trusted computing technologies and techniques into every aspect of security solution development, from design and testing to supply chain and manufacturing. This comprehensive, end-to-end approach creates an effective mesh of protection layers that integrate to ensure the reliability of Curtiss-Wright products in the face of attempted compromise. The Trusted Commercial-off-the-Shelf (TrustedCOTS™) and Enhanced TrustedCOTS portfolio of embedded security products and capabilities are aligned to provide flexibility, control, and options needed to build the right assurance level into any program.
Deploy Defense-Grade Security with Enhanced TrustedCOTS
TrustedCOTS and Enhanced TrustedCOTS leverage the commercial domain’s extensive secure state-of-the-art R&D investments, which Curtiss-Wright integrates into rugged, reliable, and reusable technology blocks. This modular open system approach (MOSA) to security uses no custom hardware, facilitating rapid and easy integration into host systems. Indeed, this approach is so adaptable it can be retrofitted to existing systems. Traditionally, defense-grade security solutions require custom hardware somewhere in the system to protect a user's application. This was an expensive and time-consuming effort that could cause significant program schedule delays. The Enhanced TrustedCOTS approach provides the necessary infrastructure on select processor modules to allow the hosting of IP from Raytheon Intelligence & Space, Idaho Scientific, StarLab, and Wind River.

TrustedCOTS and Enhanced TrustedCOTS for Trusted Computing
TrustedCOTS Embedded Processor Cards
Curtiss-Wright's approach to embedded security design deploys defense-in-depth and defense-in-breadth strategies to take advantage of the security technologies inherent in commercial components and employ defense-grade security technologies. The TrustedCOTS framework is a baseline security framework that fully enables the security capabilities of commercial hardware and software technologies to protect customer applications from compromise.
CHAMP-XD1
The CHAMP-XD1/VPX3-482 3U OpenVPX Intel Xeon D DSP Processor Card features high-speed DDR4 memory, Gigabit Ethernet, 10 Gb Ethernet, XMC site with PCIe Gen3 in conduction and air-cooled versions.

CHAMP-XD1
The CHAMP-XD1/VPX3-482 3U OpenVPX Intel Xeon D DSP Processor Card features high-speed DDR4 memory, Gigabit Ethernet, 10 Gb Ethernet, XMC site with PCIe Gen3 in conduction and air-cooled versions.
VPX3-1262
The VPX3-1262 integrates Intel’s i7-13800HRE 14-core hybrid processor technology (formerly “Raptor Lake”) with Curtiss-Wright’s proven ruggedization technology to excel in harsh environments.

VPX3-1262
The VPX3-1262 integrates Intel’s i7-13800HRE 14-core hybrid processor technology (formerly “Raptor Lake”) with Curtiss-Wright’s proven ruggedization technology to excel in harsh environments.
VPX3-1260
The VPX3-1260 rugged 3U OpenVPX 9th Gen Intel® Xeon® SBC delivers full-featured, all-in-one processing for high-performance embedded computing, general-purpose processing and C5ISR applications.

VPX3-1260
The VPX3-1260 rugged 3U OpenVPX 9th Gen Intel® Xeon® SBC delivers full-featured, all-in-one processing for high-performance embedded computing, general-purpose processing and C5ISR applications.
VPX6-1961
The first of its kind in the industry, the VPX6-1961 Intel Xeon W-11000E 8-core processor card is our most powerful and capable single board computer yet.

VPX6-1961
The first of its kind in the industry, the VPX6-1961 Intel Xeon W-11000E 8-core processor card is our most powerful and capable single board computer yet.
VPX3-1220
The VPX3-1220 3U VPX high-performance, 7th Gen Intel Xeon processor card is designed for low-power SWaP-constrained applications.

VPX3-1220
The VPX3-1220 3U VPX high-performance, 7th Gen Intel Xeon processor card is designed for low-power SWaP-constrained applications.
XMC-121
Designed for space-constrained size, weight and power (SWaP)-sensitive programs, the XMC-121 small form factor Intel Xeon x86 Single Board Computer (SBC) offers extremely powerful x86 processing.

XMC-121
Designed for space-constrained size, weight and power (SWaP)-sensitive programs, the XMC-121 small form factor Intel Xeon x86 Single Board Computer (SBC) offers extremely powerful x86 processing.
VPX3-152 & V3-152
The VPX3-152 & V3-152 3U OpenVPX SBC features NXP’s quad-core Power Architecture QorIQ T2080 processor, coupled with an extensive I/O complement for ultimate flexibility.

VPX3-152 & V3-152
The VPX3-152 & V3-152 3U OpenVPX SBC features NXP’s quad-core Power Architecture QorIQ T2080 processor, coupled with an extensive I/O complement for ultimate flexibility.
CHAMP-XD2
The CHAMP-XD2 6U VPX Intel Xeon D DSP Processor Card features 32 GB DDR4 per Xeon socket, 40G/10G Ethernet, InfiniBand, XMC, PCIe Gen3 and more.

CHAMP-XD2
The CHAMP-XD2 6U VPX Intel Xeon D DSP Processor Card features 32 GB DDR4 per Xeon socket, 40G/10G Ethernet, InfiniBand, XMC, PCIe Gen3 and more.
CHAMP-XD2M
The rugged CHAMP-XD2M 6U OpenVPX Intel Xeon D processor module is designed for use in high memory capacity, compute-intensive rugged applications.

CHAMP-XD2M
The rugged CHAMP-XD2M 6U OpenVPX Intel Xeon D processor module is designed for use in high memory capacity, compute-intensive rugged applications.
VME-1910
The VME-1910 brings Intel’s powerful 9th Gen Xeon processor and today’s latest software and security advances to legacy VME systems.

VME-1910
The VME-1910 brings Intel’s powerful 9th Gen Xeon processor and today’s latest software and security advances to legacy VME systems.
VPX3-133
VPX3-133 3U VPX NXP Power Architecture T2080 SBC includes quad-core processor at 1.5GHz, 8 GB DDR3, I/O for Ethernet, serial, SATA, USB 2.0, PCI Express, TTL and differential discretes.

VPX3-133
VPX3-133 3U VPX NXP Power Architecture T2080 SBC includes quad-core processor at 1.5GHz, 8 GB DDR3, I/O for Ethernet, serial, SATA, USB 2.0, PCI Express, TTL and differential discretes.
VPX6-197
The VPX6-197 6U OpenVPX SBC combines the performance and the advanced I/O capabilities of the NXP’s Power Architecture quad-core AltiVec enabled T2080 processor.

VPX6-197
The VPX6-197 6U OpenVPX SBC combines the performance and the advanced I/O capabilities of the NXP’s Power Architecture quad-core AltiVec enabled T2080 processor.
VPX3-1703
The VPX3-1703 3U OpenVPX NXP Layerscape LS1043A Arm processor card combines the high performance of the quad-core A53 processor with advanced I/O capabilities for low-powered, rugged, SWaP-constrained applications.

VPX3-1703
The VPX3-1703 3U OpenVPX NXP Layerscape LS1043A Arm processor card combines the high performance of the quad-core A53 processor with advanced I/O capabilities for low-powered, rugged, SWaP-constrained applications.
VPX3-1708 & V3-1708
The VPX3-1708 and V3-1708 3U OpenVPX NXP LX2160A Arm-based Processor Cards are designed to reduce the time, cost and risk associated with getting rugged, safety-critical systems to the field.

VPX3-1708 & V3-1708
The VPX3-1708 and V3-1708 3U OpenVPX NXP LX2160A Arm-based Processor Cards are designed to reduce the time, cost and risk associated with getting rugged, safety-critical systems to the field.
Enhanced TrustedCOTS
The Enhanced TrustedCOTS framework builds upon TrustedCOTS by allowing the use of specialized security capabilities to be added to provide higher levels of protection with a secure state-of-the-art FPGA. Through technology partnerships, Curtiss-Wright can add additional capabilities to meet more demanding security requirements.
CHAMP-XD4
The CHAMP-XD4 (VPX6-485) is a 6U OpenVPX high-performance embedded computing (HPEC) and cognitive digital signal processor (DSP) card designed for data-intensive applications, like high-bandwidth radar and signal intelligence systems.

CHAMP-XD4
The CHAMP-XD4 (VPX6-485) is a 6U OpenVPX high-performance embedded computing (HPEC) and cognitive digital signal processor (DSP) card designed for data-intensive applications, like high-bandwidth radar and signal intelligence systems.
CHAMP-XD3
The CHAMP-XD3/VPX3-484 3U OpenVPX Intel Ice Lake Xeon D-1700 DSP Processor Card features high-speed DDR4 memory, 10 Gb Ethernet, 40 Gb Ethernet Data Plane, AMD MPSoc FPGA for enhanced security.

CHAMP-XD3
The CHAMP-XD3/VPX3-484 3U OpenVPX Intel Ice Lake Xeon D-1700 DSP Processor Card features high-speed DDR4 memory, 10 Gb Ethernet, 40 Gb Ethernet Data Plane, AMD MPSoc FPGA for enhanced security.
CHAMP-FX7
The CHAMP-FX7 is a 6U VPX Dual AMD Versal™ Premium Adaptive System-on-Chip processor that delivers unparalleled processing speed and extensive fiber optic connectivity.

CHAMP-FX7
The CHAMP-FX7 is a 6U VPX Dual AMD Versal™ Premium Adaptive System-on-Chip processor that delivers unparalleled processing speed and extensive fiber optic connectivity.
XMC-529
The XMC-529 is a high-performance, user-programmable processing and FPGA resource for embedded security applications or use as an FPGA co-processing engine.

XMC-529
The XMC-529 is a high-performance, user-programmable processing and FPGA resource for embedded security applications or use as an FPGA co-processing engine.
XMC-528
The XMC-528 is a high-performance, user-programmable processing and FPGA resource for embedded security applications or use as an FPGA co-processing engine.

XMC-528
The XMC-528 is a high-performance, user-programmable processing and FPGA resource for embedded security applications or use as an FPGA co-processing engine.
Introduction to COTS-based Trusted Computing
This white paper looks at the use of open standards-based commercial-off-the-shelf (COTS) technologies to address Trusted Computing requirements in deployable embedded systems for aerospace and defense applications.

Introduction to COTS-based Trusted Computing
This white paper looks at the use of open standards-based commercial-off-the-shelf (COTS) technologies to address Trusted Computing requirements in deployable embedded systems for aerospace and defense applications.
Trusted Boot
This white paper looks at Trusted Boot, a key strategy for ensuring that the trustworthiness of an embedded system begins with the very first software instruction at system startup in order to protect against attacks.

Trusted Boot
This white paper looks at Trusted Boot, a key strategy for ensuring that the trustworthiness of an embedded system begins with the very first software instruction at system startup in order to protect against attacks.
Decomposing System Security Requirements
This white paper guides decomposing system security requirements and mapping a security plan to physical components to build a truly trusted system.

Decomposing System Security Requirements
This white paper guides decomposing system security requirements and mapping a security plan to physical components to build a truly trusted system.
Building a Truly Trusted Computing Solution with COTS Hardware and Intel Security Capabilities
A manufacturer of secure aerospace & defense systems sought a COTS SBC with a robust & proven security profile for its new Trusted Computing solution.

Building a Truly Trusted Computing Solution with COTS Hardware and Intel Security Capabilities
A manufacturer of secure aerospace & defense systems sought a COTS SBC with a robust & proven security profile for its new Trusted Computing solution.
Curtiss-Wright and Wind River Trusted Foundations for Mission Critical Applications

Curtiss-Wright and Wind River Trusted Foundations for Mission Critical Applications
Trusted Computing White Paper: Application Development, Testing, and Analysis for Optimal Security
We explore securing data transfer, performing testing, and leveraging existing processor features for trusted and secure application software.

Trusted Computing White Paper: Application Development, Testing, and Analysis for Optimal Security
We explore securing data transfer, performing testing, and leveraging existing processor features for trusted and secure application software.
Certification Authorities for Trusted Computing in Military and Avionics Products
This white paper provides an overview of certification authorities involved in Trusted Computing, explores which disciplines they oversee, and gives guidance on when to get these certification authorities involved.

Certification Authorities for Trusted Computing in Military and Avionics Products
This white paper provides an overview of certification authorities involved in Trusted Computing, explores which disciplines they oversee, and gives guidance on when to get these certification authorities involved.
The Impact of Protecting I/O Interfaces on System Performance
A trusted computing system can ensure security at the potentially vulnerable entry points of system interfaces, yet this may compromise performance through design trade-offs that systems designers must compensate for.

The Impact of Protecting I/O Interfaces on System Performance
A trusted computing system can ensure security at the potentially vulnerable entry points of system interfaces, yet this may compromise performance through design trade-offs that systems designers must compensate for.
Optimizing Cybersecurity on Today's Connected Military and Commercial Aircraft
System developers must safeguard tactical information exchange and the integrity of command and control links between ground stations and airborne platforms.

Optimizing Cybersecurity on Today's Connected Military and Commercial Aircraft
System developers must safeguard tactical information exchange and the integrity of command and control links between ground stations and airborne platforms.
Beyond Trusted Computing
Read the white paper by Curtiss-Wright TCOTS experts and learn about our holistic approach to Trusted Computing that applies rigorous protection standards at every stage of the development process.

Beyond Trusted Computing
Read the white paper by Curtiss-Wright TCOTS experts and learn about our holistic approach to Trusted Computing that applies rigorous protection standards at every stage of the development process.
TrustedCOTS: Leading the Way to Secure Systems
This white paper highlights the capabilities that Curtiss-Wright has established to protect the leading-edge deployed systems developed by our customers.

TrustedCOTS: Leading the Way to Secure Systems
This white paper highlights the capabilities that Curtiss-Wright has established to protect the leading-edge deployed systems developed by our customers.
Developing a Secure COTS-Based Trusted Computing System
System-level security is more than simply the sum of its parts. Read about key protections that must be considered when developing a secure COTS-based Trusted Computing system.

Developing a Secure COTS-Based Trusted Computing System
System-level security is more than simply the sum of its parts. Read about key protections that must be considered when developing a secure COTS-based Trusted Computing system.
The Root of Trust: A Foundation for Trusted Computing
Steve Edwards looks at the growing demand for trusted computing solutions with effective protections against cyberattacks in the global defense electronics market.

The Root of Trust: A Foundation for Trusted Computing
Steve Edwards looks at the growing demand for trusted computing solutions with effective protections against cyberattacks in the global defense electronics market.
Considering the Role of Hardware in Securing OS and Hypervisor Operation
This white paper by David Sheets explores the role that hardware plays in ensuring the security of operating systems (OS) and hypervisors.

Considering the Role of Hardware in Securing OS and Hypervisor Operation
This white paper by David Sheets explores the role that hardware plays in ensuring the security of operating systems (OS) and hypervisors.