Showing 25 - 32 of 56
Military & Aerospace Electronics

Trusted Computing: An Overview

Attacks are getting sophisticated. Examples include Rowhammer, Meltdown, Spectre, and others. System designers need to consider many attack vectors.

12/18/2019
Military & Aerospace Electronics

The Different Trusted Computing and Cyber Security Approaches for Embedded Computing and Enterprise Systems

Embedded systems for deployment in the field can have vastly different needs for trusted computing and cyber security than those of enterprise systems.

11/21/2019
Military & Aerospace Electronics

Unmanned Systems Vulnerable to the Enemy, Which Makes Trusted Computing a Critical Cyber Design Challenge

Reliable, secure communications become much more critical in unmanned systems. If communications are lost, the unmanned system may need to throttle back.

10/31/2019
Military Embedded Systems

Best in Show Awards Selected at AUSA 2019

Curtiss-Wright wins multiple Best in Show Awards at the event.

10/16/2019
Military & Aerospace Electronics

Understanding Cyber Attacks in Embedded Computing Enables Integrators and Suppliers to Consider Options

The trusted computing task is to apply practical measures that can mitigate the effects of known cyber threats to aerospace and defense systems.

08/21/2019
Military & Aerospace Electronics

Trusted Computing and the Challenges of Cryptographic Algorithms in Quantum Computing

Quantum computing processes an algorithm by configuring quantum gates and initializing the qubits. Taking a measurement resolves the quantum states.

07/24/2019
Military & Aerospace Electronics

Trusted Computing Can Depend on Asymmetric Cryptography Algorithms to Assure the Integrity of Protected Data

Asymmetric algorithms enable systems designers to pair keys to facilitate more novel cryptographic operations than traditional symmetric algorithms.

06/26/2019
Military & Aerospace Electronics

Cryptography in Trusted Computing: an Introduction to Secure Hashing

Cryptography forms the foundation of many aspects of trusted computing. This article considers recent algorithms and cryptographic attacks, as well as some future directions for cryptography in deployed embedded systems.

04/24/2019