Latest News
Washington D.C — June 3, 2024 — Star Lab Corp®, a global leader in delivering technology protection and embedded security solutions for mission-critical systems, announced their new capabilities for Kevlar Embedded Security: a Yocto Project-based security solution for Linux-based systems at the intelligent edge.
The new capabilities protect critical data and applications at-rest and at runtime, addressing threats from multiple commonly used attack vectors. Leveraging containerization isolation, Kevlar Embedded Security ensures a protected container cannot be accessed or inspected, ensuring critical data used by a container also stays protected.
Washington D.C — June 3, 2024 — Star Lab Corp®, a global leader in delivering technology protection and embedded security solutions for mission-critical systems, announced their new capabilities for Kevlar Embedded Security: a Yocto Project-based security solution for Linux-based systems at the intelligent edge.
The new capabilities protect critical data and applications at-rest and at runtime, addressing threats from multiple commonly used attack vectors. Leveraging containerization isolation, Kevlar Embedded Security ensures a protected container cannot be accessed or inspected, ensuring critical data used by a container also stays protected.
Washington D.C — Jan. 23, 2024 — Star Lab Corp®, a global leader in delivering technology protection software for mission-critical systems, today announced the release of Titanium for KVM, its response to the growing need for an easily implemented security solution for Kernel-based Virtual Machines (KVM). The culmination of a multi-year effort, this solution extends Star Lab’s Titanium Technology Protection capabilities to support the KVM host, an open-source virtualization technology that turns Linux into a hypervisor.
Star Lab Corp®, a global leader in delivering embedded security solutions for mission-critical systems, announced the release of Kevlar System Inspector: a free test suite that examines the inherent security of intelligent devices and IoT systems such that they are secure by design.
Star Lab Corp®, a global leader in delivering technology protection software for mission-critical systems, announced that Aptiv PLC (NYSE: APTV) has completed the acquisition of Wind River® and its subsidiaries as of December 23, 2022.
EVENTS
Star Lab Blog
As embedded Linux systems become more prevalent, they also become more attractive targets for offline attacks. These attacks, which bypass real-time system defenses, can expose sensitive data and compromise system integrity. In this article, we’ll discuss the problem of offline attacks and explore the challenges involved protecting embedded software from this type of attack.
Symbolic links, or symlinks, are a feature pretty familiar to anyone with a *nix background. These file shortcuts have been around in Unix since the early 1980s and have been a part of POSIX since its inception. Today they are supported almost everywhere: Linux, MacOS, Android, every flavor of Unix, and even Windows supports symlinks. They are ubiquitous, convenient, useful…and occasionally dangerous.
For organizations operating within regulated environments, it is important that their systems be robustly protected against potential attacks. Many times, this is done through the use of Security Technical Implementation Guides (STIGs) applied to their system. Until recently, it has been unclear what, if any, STIGs are available for Linux-based virtualized systems.
FMS-readiness is quickly emerging as an important element to the U.S. National Defense Strategy. With roughly $41B[1] being spent on FMS cases each year, The U.S.’s efforts to prevent the rogue development and unintended transfer of critical military technologies continues with importance. Still, FMS programs are expensive and fraught with risk. These programs have more stakeholders, expanding requirements, and demands to protect critical technology. Unfortunately, most baseline programs, if triggered to perform an FMS program for the first time, are surprised at the requirements and often take an adversarial posture to meeting them. To counter this attitude and continue the important function of protecting our critical technology, programs should adopt an FMS-ready mindset during baseline development.