Truemag

  • Subscribe
    • New Subscription
    • Account Updates
    • Customer Service
  • News & Events
    • News
    • Events
  • Advertise
    • Media Kit
    • Reprints
    • Contacts
  • Editorial
    • Podcasts
    • Current Articles
    • Digital Editions
    • eNewsletter
    • Editor’s Desk
    • Edit Calendar
    • Contacts
  • Buyers Guide
    • Search
    • Sponsor Index
    • Vendor Update
  • Annual Software Ranking
    • Ranking Form
    • Annual Software Ranking
    • 2018 Software Ranking File Package

RunSafe Security Launches Integration with Yocto Project

06.03.2020

RunSafe Security, a pioneer of the patented process to immunize software from cyber-attacks and disrupt hacker economics without developer friction, today announced an integration with Yocto Project (YP), an open source collaboration project which enables developers to create custom Linux-based systems for an expanding array of uses including embedded, IoT, connected edge, servers, and virtual environments. YP ecosystem members and participants include Intel, Wind River, Texas Instrument, Facebook, Comcast, Cisco, Juniper Networks, Dell, LG Electronics, and more. With this integration, RunSafe’s Alkemist can immunize software by simply adding a layer into Yocto build environments without changing a line of code or slowing down product releases.

“With its accelerating adoption for building embedded linux distributions, Yocto users needed a simple and seamless solution to reduce attack surfaces and enable continuous delivery, without chasing vulnerabilities and delaying releases,” said Joe Saunders, CEO of RunSafe Security. “Alkemist provides the perfect solution. We’re able to immunize code without developer friction and shift hacker economics back in favor of the manufacturers and users of embedded devices.”

Since the images running on each Yocto-built embedded system are identical, a single vulnerability can expose thousands of systems and attackers can easily scale their attacks. Alkemist mitigates this concern by using a patented technique called Load-time Function Randomization (LFR), which creates greater memory diversity by restacking functions in memory, before a process begins executing, every time that process executes. By performing randomization at runtime instead of build-time, Alkemist is able to preserve “Binary Reproducibility,” one of the Yocto Project’s core features, while dramatically increasing security against memory-based attacks.

“We’re excited to support Yocto users to insert security into the build toolchain while reducing costs associated with frequent security updates and releases of IoT and embedded systems,” said Doug Britton, chief technical officer, RunSafe Security. “Alkemist helps our customers maintain product velocity without sacrificing security, and provides greater memory location entropy without sacrificing performance or ease of application. Through this integration, we can effectively immunize an entire class of IIoT devices from persistent and powerful memory corruption vulnerabilities.”

t https://runsafesecurity.com/yocto

Jun 3, 2010Cassie Balentine
Infragistics Delivers New Features in Infragistics Ultimate 20.1 UX/UI Toolkit ReleaseHCL and Google Cloud Expand Partnership to Digitally Transform Commerce
Product Centrics
TrueNAS Open Source Storage Platform brings Full Windows ACL Support to Linux

Fully featured Windows file system ACLs are well supported in TrueNAS 12.0 (CORE and Enterprise), but not generally supported by Linux. Thanks to some innovation, and sweat from the iXsystems engineering team, TrueNAS SCALE 21.08...

Driving Successful Digital Transformation Initiatives in 2022

Well, the end of the year is the perfect time to reflect on all the past year's activities and plan for the coming year. As we plan for 2022, one thing...

Recovery Platforms

Established in 2013, Imanis Data, previously Talena...

Data Driven Efficiency

Founded in 2003, Tableau is a public software company...

Updated Hitachi CRM

Building Product Manufacturers (BPM) require...

Quick Links
Untitled Document
SW500 SW500 SW500 SW500 SW500
2022 © Rockport Custom Publishing, LLC