security

13 articles

Securing Critical Infrastructure with MILS

By Paul Chen On February 12, the White House released the Presidential Policy Directive 21 (PPD-21), Critical Infrastructure Security and Resilience. The DHS website describes PPD-21 as “advancing a national policy to strengthen and maintain secure, functioning, and resilient critical infrastructure.” Sixteen different critical infrastructure sectors are identified, including: Chemical, Communications, Energy, Financial Services, Healthcare and Public Health, Food and…

Avionics Europe 2013 Conference

By Paul Parkinson Last week I attended the Avionics Europe 2013 conference, which was held in Munich for the last time perhaps (as it is moving to Abu Dhabi in 2014). The theme of this year's conference was 'Tackling the Challenges in Avionics: Single Sky Many Platforms,' which continued to focus on the growth in air traffic across Europe and…

The Advent of Multi-core MILS

By Paul Parkinson It has been a rather long time since my previous blog post. I intended to post a blog before the holidays regarding our partner Curtiss-Wright's announcement about VxWorks MILS support on the VPX6-187, but I simply ran out of time! So here it is as my first blog post of 2013. The Curtiss-Wright new release was actually quite a game changer. To…

The New FACE of Avionics

By Chip Downing Earlier this year, Wind River announced its support of the Future Airborne Capability Environment (FACE) technical standard, which hopes to resolve two fundamental problems with military procurements. First, current aviation systems are typically developed for a unique set of requirements by a single vendor for a single aircraft, resulting in limited portability of software components, increased costs,…

Identifying Backdoors in Production-Ready Code

By Ido Sarig The security world is abuzz with news about a “backdoor” - undocumented  access to its programmatic interface -  found in a popular FPGA manufactured in China and used in US military applications. Whether you are concerned that this is a deliberate Chinese plot to attack Western militaries, or relieved to hear that this is just a "common" backdoor,…

What is the Real Impact of DO-178C and ED-12C?

By Joe Wlad DO-178C and ED-12C are now released.  What does this mean for Wind River and its customers? Now that RCTA DO-178 and its European equivalent, EUROCAE ED-12, have been updated after nearly twenty years, many are wondering, what is the impact to Wind River and our customers?  We’ve provided our customers with products and services based on DO-178B…

Avionics 2012 conference

By Paul Parkinson It's been a long time since my previous blog, as unfortunately I've been engrossed in a number of projects! However, I have just got time to mention that I'm really looking forward to the Avionics Europe conference in Munich on 21-22 March. The conference programme is pretty packed, covering cockpit avionics and technologies for civil and military…

Secure Mobility Message Resonates at MILCOM 2011

By Chip Downing MILCOM 2011 last week in Baltimore, MD was not only educational, but it was a watershed event.   Last year, it was a “coming out” party for custom Android devices; this year however, was the year where many companies are now using COTS hardware and software to their fullest extent, along the entire supply chain, from core to…

Unmanned Systems: More Reports of Security Vulnerabilities

By Joe Wlad By now, you’ve likely heard the latest report of security holes in unmanned ground control systems. This time, a key-logging virus has been found on one or more hard drives at the Nevada operations center for the Predator and Reaper unmanned vehicles. While the investigation is ongoing and impact of the virus is determined, the real concern…

The Dawn of a Paradigm Shift in Embedded Device Software Security

By Marc Brown The number of connected embedded and mobile devices is increasing exponentially, predicted to be in excess of 50 billion by 2020.  The lion’s share of this growth is expected to come from traditional market segments where there is an increasing push to transform sensing equipment to more autonomous embedded control, real-time telemetry, and proactive diagnostics. We all know…