A Trusted Computing Framework for Embedded Systems

Award Information
Agency: Department of Defense
Branch: Air Force
Contract: FA8750-12-C-0126
Agency Tracking Number: F11B-T15-0267
Amount: $100,000.00
Phase: Phase I
Program: STTR
Awards Year: 2012
Solicitation Year: 2011
Solicitation Topic Code: AF11-BT15
Solicitation Number: 2011.B
Small Business Information
15400 Calhoun Drive, Suite 400, Rockville, MD, -
DUNS: 161911532
HUBZone Owned: N
Woman Owned: Y
Socially and Economically Disadvantaged: N
Principal Investigator
 Julia Deng
 Principal Scientist
 (301) 294-5209
Business Contact
 Mark James
Title: Director, Contract&Proposal
Phone: (301) 294-5221
Email: mjames@i-a-i.com
Research Institution
 North Carolina State University
 Peng Ning
 Department of Computer Science
3258 Engineering Building II
Raleigh, NC, 27695-7695
 (919) 513-4457
 Nonprofit college or university
ABSTRACT: The damage and loss caused by attacks and security breaches have drawn attentions to develop secure and reliable systems for embedded systems. Compared to their desktop counterparts, embedded devices are facing more security challenges, such as the more possible physical access to a target device and more constrained computing environment (e.g., limited RAM and CPU power). Together, these challenges lead to a favorable hardware/software co-design approach to deal with security issues for embedded systems. This proposal presents a trustful computing framework based on hypervisor for embedded systems. Our framework is a hybrid approach consisted of both hardware and software components. The trustworthy of our approach benefits from a hardware-based root-of-trust device, trustful boot-loader, and trustful hypervisor. By taking the benefits from all the trustful components, our trustful computing framework will provide an efficient, flexible and secure computing environment for embedded systems. BENEFIT: The proposed Trusted Computing Framework for Embedded Systems has tremendous applications potential in dynamic military applications. Given the GIG vision, such highly distributed embedded systems will be common and therefore secure, robust, efficient and timely information delivery is necessary. Security in embedded systems has been paid great interest in the last couple of years in different DoD agencies. The proposed trusted computing platform can be applied to various military networks for major programs like layered sensing program, surveillance network, Future Combat System (FCS), WIN-T etc. In addition, due to the increasing popularity of ubiquitous computing, our proposed solution can be applied into a large number of commercial embedded system applications, such as industrial control networks, border monitoring networks, and homeland security applications.

* Information listed above is at the time of submission. *

Agency Micro-sites

SBA logo
Department of Agriculture logo
Department of Commerce logo
Department of Defense logo
Department of Education logo
Department of Energy logo
Department of Health and Human Services logo
Department of Homeland Security logo
Department of Transportation logo
Environmental Protection Agency logo
National Aeronautics and Space Administration logo
National Science Foundation logo
US Flag An Official Website of the United States Government