Military Cyber Security: Threats and Solutions
U.S. government and military are taking a lead role in protecting sensitive computers from cyber attack, and solutions finally are on the horizon.
Trusted Computing: An Overview
Attacks are getting sophisticated. Examples include Rowhammer, Meltdown, Spectre, and others. System designers need to consider many attack vectors.
Curtiss-Wright, Green Hills, and L3Harris Technologies Demo FACE Conformant Software Running on 7th Gen Intel Xeon Platform
The demo features L3Harris’s FliteScene® Digital Moving Map Software, Green Hills Software INTEGRITY-178® tuMP RTOS, and Curtiss-Wright Single Board Computers and Graphics Modules.
Understanding Cyber Attacks in Embedded Computing Enables Integrators and Suppliers to Consider Options
The trusted computing task is to apply practical measures that can mitigate the effects of known cyber threats to aerospace and defense systems.
New Developments in Aviation Cybersecurity and Next-Generation Crash Recorders
Paul Hart discusses the latest EASA regulations for cybersecurity and DO-326A Airworthiness Security Process Specifications.
Curtiss-Wright and Green Hills Collaborate to Demo INTEGRITY-178 tuMP Safety-Certifiable RTOS on Arm VPX3-1703 SBC
Green Hills Software’s field-proven INTEGRITY-178 tuMP safety- and security-critical multi-core real-time operating system (RTOS) will be demonstrated for the first time running on the Curtiss-Wright VPX3-1703.
Trends in Trusted Computing and Network Security in Aerospace and Defense Embedded Computing Applications
In a constantly evolving threat environment, where new attacks arrive virtually every day, system architects must design networks to be as secure as possible.
Optimizing Cyber Security and Trusted Computing on Today’s Connected Military and Commercial Aircraft
If not properly protected by taking trusted computing measures, every system on an aircraft can create a potential vulnerability. Paul Hart talks about optimizing cyber security on today’s connected military and commercial aircraft.
Military Organizes for Cyber Warfare
J.R. Wilson from Military & Aerospace looks closely at how U.S. warfighters work aggressively to protect computers and networks, just as they would do to protect territory, airspace, sea lanes, and access to space.
Milestone in Abstracting the Hardware: Realizing the Promise of FACE
With the wide adoption of FACE, system integrators can reap tremendous benefits in interoperability and cost.
Curtiss-Wright and Green Hills Collaborate to Bring INTEGRITY-178 tuMP Safety-Certifiable RTOS to VPX3-1703 Arm SBC
Low-power Arm-based VPX3-1703 joins Curtiss-Wright’s family of Intel® and Power Architecture® SBCs and expands support for Green Hills Software® INTEGRITY®-178 tuMP Safety-Certifiable RTOS.
Curtiss-Wright, Green Hills, and Harris are First to Demo FACE-Conformant Software Running Simultaneously
Demo features Harris' FACE-conformant FliteScene® Digital Moving Map software and Curtiss-Wright 3U OpenVPX single board computers and graphics modules