Trusted & Resilient Systems
Riverside Research provides solutions and enabling technologies for trusted and resilient systems. Our solutions include secure-by-design hardware and software, unique hardware and software protections via passive analog emissions, and secure open architectures.
Riverside Research provides systems security assessment, vulnerability discovery, mitigation, software protection, and malicious software analysis. We developed an innovative passive, non-invasive technology for anti-cloning and related security applications requiring unique device recognition and runtime verification. This technology is demonstrated to work on microprocessors, application-specific integrated circuits (ASICs), programmable logic controllers (PLCs), and field programmable gate arrays (FPGAs) with extremely high (99%+) detection and very low false positive rates.
Riverside Research is involved in the development and accreditation of a DOD-approved end-node security solution which creates a secure end-node from trusted media (such as a CD or USB flash drive) without mounting a local hard drive. No trace of work activity (or malware) can be written onto the local computer using this technology.
In addition, Riverside Research provides technical subject matter expertise to support research, development, and testing of tamper detection and software protection including profiling attack vectors, developing protection schemas, and developing models to forecast the effectiveness of protections.
Our trusted and resilient systems experts support research and development in the following areas:
- Side-channel analysis
- Open systems architecture and security
- Critical infrastructure protection
- Secure communications
- Trusted systems/micro-electronics
- System protection technology
- Vulnerability analysis
- Secure by design