System Security
Embedded Systems Security


Contact Information

Joseph Loomis
Group Leader
Embedded Systems Security
(210) 522-3367
jloomis@swri.org

image: SwRI engineers use state-of-the-art test equipment, software tools, and laboratory facilities to evaluate the capabilities, benefits, performance, and costs associated with alternative embedded system implementation.

SwRI engineers use state-of-the-art test equipment, software tools, and laboratory facilities to evaluate the capabilities, benefits, performance, and costs associated with alternative embedded system implementation.

image: A variety of embedded systems security services is offered by extensively experienced engineers at Southwest Research Institute (SwRI).

A variety of embedded systems security services are offered by extensively experienced engineers at SwRI.

Implementing security in embedded systems and providing secure communications paths back into the enterprise are paramount. Experienced engineers at Southwest Research Institute (SwRI) offer a variety of security technologies, embedded security services, and solutions.

Embedded Security Services at SwRI

Trade-space analysis and security testing are among the many security services offered by SwRI. Others include designs for a variety of embedded systems and domains such as:

  • Network-enabled devices
  • Machine information security
  • Advanced metering infrastructure
  • SCADA security
  • Weaponry
  • Sensors
  • Situational awareness systems

Threat to Embedded Devices

The evolution of computing and information technology is resulting in migration beyond centralized enterprise and desktop systems and out to increasingly sophisticated embedded devices in the field. As information is pushed to the edge of the extended network, increased opportunities exist for:

  • Devices to be compromised
  • Intellectual property to be stolen
  • Information to be exploited and/or altered

Cyber Security Solutions

The multidisciplinary approach used by our engineers brings together the disparate worlds of security and embedded systems. To determine the most efficient ways to meet security needs on resource-limited platforms, these engineers have extensively studied embedded applications of various encryption and authentication technologies such as:

  • Rivest, Shamir, and Adelman (RSA)
  • Elliptic curve cryptography (ECC)
  • Public key infrastructure (PKI)

Related Terminology

embedded devices  •  limited communications channels  •  network-enabled weaponry  •  situational awareness support systems  •  intellectual property protections  •  secure communications  •  advanced metering infrastructure  •  SCADA security  •  embedded software development  •  embedded hardware development  •  radio communications  •  network communications  •  cyber security  •  elliptic curve cryptography

Benefiting government, industry and the public through innovative science and technology
Southwest Research Institute® (SwRI®), headquartered in San Antonio, Texas, is a multidisciplinary, independent, nonprofit, applied engineering and physical sciences research and development organization with 10 technical divisions.
07/13/16