Security IP Products

Cyber Secure Processor

Helios is an innovative secure processor, unencumbered by legacy architectures, to finally design in positive control and design out memory corruption vulnerabilities.

Helios prevents code injection attacks, COP/JOP, planting foreign code in or tampering with boot, memory corruption attacks on non-owned memory, cold boot or data remanence attacks, and reading or altering memory via I/O, DMA or Rowhammer-style attacks.

Helios builds upon the more inherently secure Harvard architecture and adds the ability to facilitate just-in-time decryption and authentication of instructions and data within the security boundary of the processor. In this design, the instruction and data interfaces are securely isolated by a hardware-based crypto engine.

This approach alone prevents 46% of known cyber attacks.

Helios is licensed as IP for FPGA and ASIC designs. Helios delivers:

  • Positive Control: The processor will only execute genuine instructions

  • Confidentiality: Bad actors cannot extract unencrypted information

  • Compatible Integration: Does not require the re-architecture of software

  • Cyber Survivability: Prevent and detect memory corruption exploits

  • Embedded Cross Domain Solutions/Multi-Level Security: Cryptographic separation of processes

  • Physical Attack Protection: Includes state of the art anti-tamper protections

Request More Info

Schedule a Time To Talk