Dover will present live CoreGuard demos and a technical presentation at Embedded World 2018.
Dover is excited to announce that we will be exhibiting at Embedded World February 27 - March 1 in Nuremberg, Germany. Our attendance will feature our flagship security solution, CoreGuard™, the industry’s first hardware-based cybersecurity solution designed to directly integrate into silicon processors and deliver robust security against network-based attacks. Find us in Hall 4A, Booth #643.
During the show, attendees will see firsthand how CoreGuard ensures the safety, security, and privacy of embedded systems by stopping attacks in real-time, before any damage can be done. The live demonstration will feature identical attacks on two different systems, one protected by CoreGuard and one left unprotected. In this demonstration, attendees will see how the CoreGuard-protected system can easily stop an attack, ensuring the privacy and security of the system, the user, and the data. This is a demonstration you won’t want to miss.
Steve Milburn, Dover’s Chief Technology Officer, will also be a featured presenter at Embedded World during the RISC-V talk track on February 27. Steve’s abstract, based on the CoreGuard IP, was selected from a wide range of submissions. His presentation will explain how CoreGuard’s solution of securing RISC-V machines using software-defined metadata policies is the most robust, flexible, and updatable approach on the market today. See below for a excerpt of Steve’s speech:
At the highest, most simplified level, the ideal approach to securing a system (hardware or software) consists of three interrelated activities:
1. Specification: Precise definition of the required behavior of the system, including both acceptable and disallowed behaviors. This specification subsumes strictly “security-related” concerns and includes basic functional correctness. Groups within the RISC-V community are currently working in this area.
2. Implementation: Implementation of hardware in some HDL (hardware description language), e.g. Verilog, and software in programming languages, such as C/C++, Java, etc. Presumably the implementation will be done with requirements, including security, in mind.
3. Verification: Proof, or argument, that the implementation satisfies the specification. For simplicity, we will focus on verification of security properties, which can be viewed as the definition of “bad” behaviors and the proof that any “bad” behaviors cannot happen at runtime.
Be sure to tune into Steve's presentation for the full description of how RISC-V machines are secured using metadata policies. Check back after the conference for a full copy of the presentation.
“The growth of IoT means more entry points and more opportunity for cyberattacks. Unfortunately, traditional software-only approaches to security act as a bandage, seeking to protect devices with layers of inherently flawed software. Unlike anything else on the market today, CoreGuard delivers security directly in silicon and is guaranteed to defend against all network-based attacks,” said Jothy Rosenberg, Founder & CEO, Dover Microsystems. “We look forward to connecting with our colleagues at Embedded World and to sharing some exciting news about the commercialization of our technology.”
We encourage everyone attending Embedded World 2018 to stop by the Dover booth and witness firsthand how CoreGuard works to stop cyberattacks in their tracks. If you would like to schedule a time for a private demonstration or a deeper technological dive, please follow the link below. Hope to see you there!
Subscribe to Dover's blog for frequent updates and industry insights.