Encrypting in a Dangerous World

Suppose you have a very difficult threat model for your embedded system. Not only is your adversary technically skilled, but they are going to have physical access to your device.Maybe you are exporting a SCADA controller containing critical or trade...

Designing for Isolation Using Virtualization

In October 2018, the GAO released a report on cyber vulnerabilities in weapons systems. This report highlights the need to consider cyber survivability in the weapons system design process.

Star Lab: Leading the Future of Security & Virtualization

Welcome to the new Star Lab website. We’ve updated our logo and reimagined our website to reinforce the integrated and holistic approach that we take to provide our customers with the highest level of integrity across an entire program lifecycle.