The main source of cybersecurity issues can be attributed to either improper security measures or faulty software where defects in either the software architecture, design, implementation or configuration create vulnerabilities that can be potentially exploited for attacks.
When designing an IoT or a connected system, security engineers can in effect rely on three pillars:
- Secure elements or hardware coprocessors for the Root of Trust, cryptographic operations and transactions;
- Trusted Execution Environments (TEE) or secure OSs;
- Hardware- or software-based hypervisors.
In order to resist to sophisticated remote attacks targeting connected systems, secure OSs (such as TEEs) need to be formally proven in order to be as close as possible to zero-defects and to be certifiable at the highest level of security. Hypervisors need to provide real separation to prevent attacks and also need to certifiable at the highest levels of security. This is what we have done at Prove & Run.
We provide cost-effective, highly secure, off-the-shelf TEEs and hypervisors that dramatically improve the level of security of connected systems:
- ProvenCore: A formally proven OS. It is a next-generation ultra-secure TEE. ProvenCore is typically used for running security-critical applications (FOTA, VPN, firewalls, authentication systems, etc.) and to protect existing non-secure OSs. ProvenCore is available for the ARM Cortex-A and Cortex-M architectures, and there is also a RISC-V version.
- ProvenVisor: A secure hypervisor certifiable at the highest level of security. It is a next-generation ultra-secure hypervisor. ProvenVisor is typically used for secure isolation of existing OS and legacy software stacks. ProvenVisor is available on ARM Cortex-A architectures.
While ProvenCore and/or ProvenVisor can be used on their own or in combination to secure any IoT architecture, in most of the cases, the use of single instance of ProvenCore on a given IoT architecture will be sufficient in order to be protected against hackers with multi-million dollar budgets for the identification phase.
This is derived from the fact that the security properties of ProvenCore and ProvenVisor have been formally proven. That insures that they are going to be as close as possible to zero-defects and therefore highly resistant to attacks.Print