Dig Deeper Button
Virtualization Use Cases

Use Cases

• Reduce the attack surface of a mobile device and harden the remaining interfaces using the CAMA approach for mobile virtualization

• Easily prototype security-critical components on "virtual bare metal" with HaLVM

Secure Virtualization

Host commercial-off-the-shelf applications and operating systems on top of a secure infrastructure.

This technology program area covers the cross-cutting hardware and software infrastructure that our programs with assurance needs rely upon. The era of OS research where entirely new systems were built from scratch has waned (but not disappeared) since the early 1990s. Very simple kernels, like seL4 and MILS separation kernels, are a great platform upon which to build high assurance systems.

Current "assurance gaps" in the state of practice include the complex and mostly hidden state in today's very complex CPUs, motherboard support chips, shared I/O devices, complex BIOS code, fancy remote management features (like SMMI), and on and on.

Eliminate the operating system and its risks:
Haskell Lightweight Virtual Machine (HaLVM)

Run your software on HaLVM, a lightweight virtual machine that is fast, efficient, and trusted. Experience cost efficiencies, eliminate bugs, extend your security, and create a smoother experience for end users by using HaLVM.

Read More >>

Maintain confidentiality and integrity on off-the-shelf mobile devices:
Configuration-Assured Mobile Architecture (CAMA) 

Government, military, and industry demand access to mobile devices that are very similar to the best available commercial devices, and yet have strong guarantees about the behavior of the device in a particular security context. Use our component-oriented approach to security with CAMA, making it possible to instantiate a secure system with a choice of COTS components.

Read More >>