@TechmashUK @Biz_Nooz #Biz_Nooz #TechmashUK #DARPA #SSITH #Exploitation #Software #Hardware #SystemSecurityIntegrationThroughHardwareFirmware

Learn how secure processors produced by DARPA’S System Security Integration Through Hardware and Firmware (SSITH) program can protect systems from exploitation, even when those systems are running vulnerable software.

Throughout the life of the program, SSITH seeks to continuously evaluate and strengthen the secure hardware architectures in development. To support this evaluation, SSITH is developing software tools to quantitatively measure the security properties of the hardware architectures and to express and reason about security architectures at the abstract (model) level and the concrete (product) level.

Further, SSITH is exploring external evaluation efforts that involve crowdsourced red teaming of the technologies in development. This included DARPA’s first-ever bug bounty program, Finding Exploits to Thwart Tampering (FETT) Bug Bounty. Additional information on FETT.

Do you need more information? If you are looking for further details on this, then you are in luck because more information can be found on the DARPA website right here!

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

@TechmashUK @Biz_Nooz #Biz_Nooz #TechmashUK #DARPA #SSITH #Exploitation #Software #Hardware #SystemSecurityIntegrationThroughHardwareFirmware