DARPA SSITH protecting systems from exploitation

Learn how secure processors produced by DARPA’S System Security Integration Through Hardware and Firmware (SSITH) program can protect systems from exploitation, even when those systems are running vulnerable software.

Throughout the life of the program, SSITH seeks to continuously evaluate and strengthen the secure hardware architectures in development. To support this evaluation, SSITH is developing software tools to quantitatively measure the security properties of the hardware architectures and to express and reason about security architectures at the abstract (model) level and the concrete (product) level.

Further, SSITH is exploring external evaluation efforts that involve crowdsourced red teaming of the technologies in development. This included DARPA’s first-ever bug bounty program, Finding Exploits to Thwart Tampering (FETT) Bug Bounty. Additional information on FETT.

Do you need more information? If you are looking for further details on this, then you are in luck because more information can be found on the DARPA website right here!

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

@TechmashUK @Biz_Nooz #Biz_Nooz #TechmashUK #DARPA #SSITH #Exploitation #Software #Hardware #SystemSecurityIntegrationThroughHardwareFirmware

In order to keep this site free and cool forever! This post may contain affiliate links to various partners! We always say that you must never click on any link that you are not sure of! Further to that we also reconmend that you must always check with your own professional advisors before making financial decisions of any kind! We are here to offer an all around look at whats happening in tech, media, apps and websites, you can read our affiliate policy below!

Leave a Reply

Your email address will not be published. Required fields are marked *

I accept the Privacy Policy