DASH ANTI-TAMPER TOOLKIT
ANGEL Secure Networks' DASH is a flexible software framework to rapidly and inexpensively provide Anti-Tamper and Cyber Attack protection to computer systems. DASH runs on single board computers, including the rugged SBCs used by the US military. DASH can be configured to run on almost any hardware and operating system.
DASH can take advantage of any type of sensor, from monitoring code to specialized hardware AT sensors. DASH runs alongside software already on an asset. DASH can make no or minimal changes to asset software, depending on how the system designers configure DASH for their system, does not add to asset weight, and makes relatively small demands on CPU time and memory space. Since DASH makes no or minimal changes to asset software, DASH can be used to protect legacy software and has a minimal effect on asset performance. The effect, if any, DASH has on performance will be determined by the choices of the system designers and developers.
The execution environments which DASH can protect include:
(a) boards, cores, and chassis in an embedded system;
(b) desktop computers that are networked together;
(c) a network consisting of various switches and routers.
DASH propagates events which occur on one processor to other processors and other machines. Developers can configure DASH to execute custom code in response to events detected on any processor in the system.
DASH can be customized for any hardware/software configuration using code snippets that connect DASH directly to the system being protected.
With DASH, there are no keys stored statically on the system for adversaries to discover and exploit. The DASH method of key creation is covert, complex, and designed to lead adversaries down blind alleys.
Cryptographic hash algorithms
Please contact us for information on platforms not listed above.
Please contact Fred Smith, firstname.lastname@example.org, 207-866-6537