An essential step to protecting mobile and embedded devices from cyberattacks is ensuring that software is not vulnerable to malicious attacks. More than 12,000 new common vulnerabilities were identified in 2019 alone. Verifying that devices are secure is a daunting challenge, as thousands of apps and driver updates are released each year and many will contain vulnerabilities that have not yet been discovered. Typically, this would leave most devices unprotected against new attacks until patches are issued. Thanks to the newly-developed Trusted Mobile System (TrustMS), it is now possible to secure app software by preventing attackers from taking advantage of these vulnerabilities, both zero-day and known, with an added protection mechanism below the application layer. The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) worked with Intelligent Automation, Inc. (IAI), to build TrustMS, which deploys as code is executing to protect operating systems and apps on embedded platforms against most cyberattacks. TrustMS provides protections against exploits such as stack manipulation, buffer overflows, execution of unintended code, and even execution of an app's code in the wrong order. The technology monitors software as it executes, then detects attacks at the lowest levels and responds to eliminate the threat. Most significantly, it works without having to modify any source code. When a device is protected by TrustMS, its software is automatically monitored and the system will issue a customized response when attacked based on the host system's unique circumstances. Originally created for use in mobile devices such as smart phones, the technology can now be used to protect embedded and Internet of Things devices as well. | | | | |
U.S. Department of Homeland Security ·
www.dhs.gov · 202-282-8000
the blog owner has deleted the hyperlink intentionally
|
|
No comments:
Post a Comment