
Software Security By Design
Star Lab is a leading software security provider dedicated to delivering security solutions for both commercial and government customers. The company tackles the most challenging cyber problems including proactive protection of the system even during sophisticated, targeted attacks. Star Lab prides itself on having a strong focus of technical leadership, subject matter expertise, and a pedigree of developing creative and high-quality products and capabilities.

Building Security Into Embedded Linux Implementations
The cybersecurity industry today is focused on delivering solutions that prevent entry into a system. While this is necessary, it is undeniable that attackers continue to find ways around these security measures. This paper demonstrates how to go beyond bolt-on prevention tactics to build security into your systems from the start, so they are resilient to successful attacks. You will discover how to make systems secure by design with security solutions that are flexible and easy to integrate during the development phase.

Titanium Secure Boot vs. UEFI Secure Boot
Titanium Secure Boot (a form of Measured Boot) and UEFI Secure Boot are similar in that they verify the authenticity of boot-time components; however, they vary greatly in terms of how verification is performed and to what level of granularity.

Tactical Virtualization: A New Design Paradigm for Combat Systems
Cyber-attacks against high-value combat management and weapons control systems are a growing concern across the Department of Defense. Approaches to securing and defending safety-critical or mission-critical systems like the AEGIS Weapon System (AWS) and Ship Self-Defense System (SSDS) vary from basic network firewalls to persistent threat monitoring.

Titanium for Linux: Guidelines for Securing Combat Systems
Cyber-attacks against mission-critical combat systems are a growing concern across the Department of Defense. Existing approaches to securing and defending these systems almost universally adopt methods used to protect enterprise systems such as: basic network firewalls, persistent threat monitoring and auditing.

Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Sytems
The Wind River® acquisition of Star Lab combines proven anti-tamper and cybersecurity software for Linux from Star Lab with market-leading embedded software solutions for the intelligent edge from Wind River. Together, the Wind River–Star Lab product portfolio can meet the demanding aerospace and defense (A&D) requirements by protecting classified and/ or sensitive data at rest, delivering secure embedded systems, protecting communication between devices and across systems, safeguarding them over time, and responding quickly as new threats emerge.

Beyond SE Linux: Enforcing Confidentiality and Integrity for Applications and Data
One question we frequently get is “Why would I use something like Titanium Security Suite, instead of other Linux Security Modules (LSMs) like SELinux or AppArmor?”.
In short, there’s no reason you can’t use both.
SELinux and Titanium primarily differ in their threat model, concept of operations (CONOPS), and flexibility.













