|
DECEMBER 19, 2019
|
|
U.S. government and military are taking a lead role in protecting sensitive computers from cyber attack, and solutions finally are on the horizon.
|
|
|
Attacks are getting sophisticated. Examples include Rowhammer, Meltdown, Spectre, and others. System designers need to consider many attack vectors.
Of specific interest are anti-tamper technologies for secure COTS FPGAs; secure microcontrollers; volume protection within secure COTS architectures.
Current industrywide cyber protection techniques do not prevent data from being compromised prior to the digital signature or encryption processes.
The DEUCSI project seeks to share data seamlessly among fixed and mobile operating locations using high-bandwidth, beyond-line-of-sight communications.
|
|
© 2019 All rights reserved, Endeavor Business Media, LLC.
|
|