FROM OUR BLOG

Nesting XenBlanket on AWS

As a security company with a focus on utilizing hypervisor technology, the team at Star Lab wanted to research potential hypervisor-based solutions for cloud security. The demand for cloud services has skyrocketed worldwide, with an increasing amount of critical...

Encrypting in a Dangerous World

Suppose you have a very difficult threat model for your embedded system. Not only is your adversary technically skilled, but they are going to have physical access to your device.Maybe you are exporting a SCADA controller containing critical or trade...

Designing for Isolation Using Virtualization

In October 2018, the GAO released a report on cyber vulnerabilities in weapons systems. This report highlights the need to consider cyber survivability in the weapons system design process.