A Trusted Computing Framework for Embedded Systems

Award Information
Agency:
Department of Defense
Branch
Air Force
Amount:
$100,000.00
Award Year:
2012
Program:
STTR
Phase:
Phase I
Contract:
FA8750-12-C-0126
Award Id:
n/a
Agency Tracking Number:
F11B-T15-0267
Solicitation Year:
2011
Solicitation Topic Code:
AF11-BT15
Solicitation Number:
2011.B
Small Business Information
15400 Calhoun Drive, Suite 400, Rockville, MD, -
Hubzone Owned:
N
Minority Owned:
N
Woman Owned:
Y
Duns:
161911532
Principal Investigator:
Julia Deng
Principal Scientist
(301) 294-5209
hdeng@i-a-i.com
Business Contact:
Mark James
Director, Contract&Proposal
(301) 294-5221
mjames@i-a-i.com
Research Institute:
North Carolina State University
Peng Ning
Department of Computer Science
3258 Engineering Building II
Raleigh, NC, 27695-7695
(919) 513-4457
Nonprofit college or university
Abstract
ABSTRACT: The damage and loss caused by attacks and security breaches have drawn attentions to develop secure and reliable systems for embedded systems. Compared to their desktop counterparts, embedded devices are facing more security challenges, such as the more possible physical access to a target device and more constrained computing environment (e.g., limited RAM and CPU power). Together, these challenges lead to a favorable hardware/software co-design approach to deal with security issues for embedded systems. This proposal presents a trustful computing framework based on hypervisor for embedded systems. Our framework is a hybrid approach consisted of both hardware and software components. The trustworthy of our approach benefits from a hardware-based root-of-trust device, trustful boot-loader, and trustful hypervisor. By taking the benefits from all the trustful components, our trustful computing framework will provide an efficient, flexible and secure computing environment for embedded systems. BENEFIT: The proposed Trusted Computing Framework for Embedded Systems has tremendous applications potential in dynamic military applications. Given the GIG vision, such highly distributed embedded systems will be common and therefore secure, robust, efficient and timely information delivery is necessary. Security in embedded systems has been paid great interest in the last couple of years in different DoD agencies. The proposed trusted computing platform can be applied to various military networks for major programs like layered sensing program, surveillance network, Future Combat System (FCS), WIN-T etc. In addition, due to the increasing popularity of ubiquitous computing, our proposed solution can be applied into a large number of commercial embedded system applications, such as industrial control networks, border monitoring networks, and homeland security applications.

* information listed above is at the time of submission.

Agency Micro-sites


SBA logo

Department of Agriculture logo

Department of Commerce logo

Department of Defense logo

Department of Education logo

Department of Energy logo

Department of Health and Human Services logo

Department of Homeland Security logo

Department of Transportation logo

Enviromental Protection Agency logo

National Aeronautics and Space Administration logo

National Science Foundation logo
US Flag An Official Website of the United States Government