Security-as-a-service for embedded systems

M Vai, E Simpson, D Kava, A Lee… - MILCOM 2023-2023 …, 2023 - ieeexplore.ieee.org
In order to promote competition and technology refresh, the Department of Defense (DoD)
has required the use of a Modular Open Systems Approach (MOSA) for the acquisition and …

Agile and Resilient Embedded Systems

M Vai, D Whelihan, K Denney, R Lychev… - MILCOM 2021-2021 …, 2021 - ieeexplore.ieee.org
Mission assurance requires all operational platforms and systems to be able to perform their
function under the ever-growing challenge of cyber hostility. Since 2014, the Air Force …

Dynamic computational diversity with multi-radix logic and memory

PG Flikkema, J Palmer, T Yalcin… - 2020 IEEE High …, 2020 - ieeexplore.ieee.org
Today's computing systems are highly vulnerable to attacks, in large part because nearly all
computers are part of a hardware and software monoculture of machines in its market …

Mission assurance: Beyond secure processing

M Vai, D Whelihan, J Leemaster… - … on Software Quality …, 2018 - ieeexplore.ieee.org
The processor of a drone runs essential functions of sensing, communications, coordination,
and control. This is the conventional view. But in today's cyber environment, the processor …

[PDF][PDF] Secure Key Management in Embedded Systems: A First Proposal.

G Jank, S Schmidt, M Koschuch - IoTBDS, 2021 - scitepress.org
The Internet-of-Things (IoT) domain is highly heterogeneous and comprises a multitude of
different devices. Because of this variety, many projects require unique compositions of …

Functionality and security co-design environment for embedded systems

J Leemaster, M Vai, D Whelihan… - 2018 IEEE High …, 2018 - ieeexplore.ieee.org
For decades, embedded systems, ranging from intelligence, surveillance, and
reconnaissance (ISR) sensors to electronic warfare and electronic signal intelligence …

Maintaining trusted platform in a cyber-contested environment

DH Hadcock, MT Britton, BW Frantz… - … Vehicles, Security, and …, 2018 - spiedigitallibrary.org
A distributed environment, such as with IoT, drastically increases the overall cyber-attack
surface. This heightens the need to maintain the highest level of trust for each system …

[PDF][PDF] Hardware Foundation for Secure Computing

D Kava, A Lee, A Mills, M Vai - ieee-hpec.org
Software security solutions are often considered to be more adaptable than their hardware
counterparts. However, software has to work within the limitations of the system hardware …

Fabrication security and trust of domain-specific ASIC processors

M Vai, K Gettings, T Lyszczarz - 2017 IEEE International Symposium …, 2017 - computer.org
Application specific integrated circuits (ASICs) are commonly used to implement high-
performance signal-processing systems for high-volume applications, but their high …