Provably secure application-specific cross-domain solutions
A security domain, security technology, applied in computer security devices, data exchange networks, instruments, etc., can solve problems such as not allowing user interaction
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0012] figure 1 A MIND synthesis pathway 100 is depicted according to an embodiment. Synthesis path 100 can implement a secure communication verifier in, for example, a multiprocessor system-on-chip (SoC), field-programmable gate array (FPGA), or application-specific integrated circuit (ASIC) using logic and runtime board support package (BSP) software. The LangSec tool generates formally verified wire protocol implementations to verify cross-domain information flow.
[0013] According to an embodiment, a SoC (or parts thereof) may be implemented as an Application Specific Integrated Circuit (ASIC). For purposes of discussion, an embodiment implemented as an FPGA will be presented. However, ASIC or SoC implementations can be developed from this disclosure.
[0014] Protocol specifications and security domain definitions 110 are provided to a set of LangSec tools 120 . These specifications / definitions define and implement formally verified secure resolvers for the cross-dom...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


