With the advent of the Internet of Things (IoT), there are attractive business models for hackers for exploiting vulnerabilities of connected systems, in particular when attacks that can be performed remotely, even when they require a substantial investment during the so-called identification phase.

When designing an IoT system, security engineers can in effect rely on three pillars:
• Secure elements or hardware coprocessors for the Root of Trust, cryptographic operations and transactions;
• Trusted Execution Environment (TEE) or secure OSs;
• Hardware - or software-based hypervisors.

In order to resist to sophisticated remote attacks targeting connected systems, secure OsSs (such as TEEs) need to be formally proven in order to be as close as possible to zero defects. Hypervisors need to provide real separation against attacks. Both need to be certifiable at the highest level of security. This is what we have done at Prove & Run.

We provide cost effective off-the-shelf forma...
With the advent of the Internet of Things (IoT), there are attractive business models for hackers for exploiting vulnerabilities of connected systems, in particular when attacks that can be performed remotely, even when they require a substantial investment during the so-called identification phase.

When designing an IoT system, security engineers can in effect rely on three pillars:
• Secure elements or hardware coprocessors for the Root of Trust, cryptographic operations and transactions;
• Trusted Execution Environment (TEE) or secure OSs;
• Hardware - or software-based hypervisors.

In order to resist to sophisticated remote attacks targeting connected systems, secure OsSs (such as TEEs) need to be formally proven in order to be as close as possible to zero defects. Hypervisors need to provide real separation against attacks. Both need to be certifiable at the highest level of security. This is what we have done at Prove & Run.

We provide cost effective off-the-shelf formally proven software bricks that dramatically improve the level of security of connected systems:

• ProvenCore: a next generation ultra secure OS (TEE) that is typically used to run security critical applications (FOTA, VPN, firewalls, authentication systems, etc.) available for ARM® Cortex®-A, RISCV and Cortex®-M processors.
• ProvenVisor: an ultra-secure hypervisor certifiable at the highest level of security available for ARM® Cortex®-A processors.

While ProvenCore and/or ProvenVisor can be used on their own or in combination, in most cases using of single instance of ProvenCore on a given system will be sufficient to protect against hackers with multi-million dollar budgets for the identification phase.
More information