Blue-ribbon Development for Secure, Reliable Systems

MARKET OUTLOOK
Blue-Ribbon Development
for Secure, Reliable Systems
Blue-Ribbon Development for Secure, Reliable Systems
MARKET OUTLOOK
I
n the investment world, we’re familiar with “blue
embedded systems are designed from the ground up
chip stocks” – the solid, reliable choices that
and are uniquely tailored to their purpose, whether
consistently produce good returns, outperform
it’s monitoring a power substation or delivering
their competitors, and never succumb to wild dips
individual medical care. But regardless of a system’s
or corrections in the market. Every industry has
provenance, they all share some things in common –
its blue chips, and every investor has their favorites.
and not all of them are good.
In the technology world, there are also blue-
As embedded systems become more complex
chip companies that supply the most solid, reliable,
and more ubiquitous, they also become more
and trouble-free components to their clients and
vulnerable to failure or attack. The rise of widespread
customers. Intel has been one of those blue-chip
wireless connectivity also leaves these systems
vendors for more than 30 years, but its “portfolio”
more exposed to outside attacks. In short, today’s
recently got even better. With technologies from the
embedded systems need the same kind of cyber-
extended Intel family, embedded software leader Wind
and anti-hacking protection as any computer. Maybe
River* and security pioneer McAfee*, Intel delivers
even more so. It’s one thing to lose the data on a
a one-two-three punch that is the envy of product-
PC to hackers. It’s another to have a power station’s
development teams.
monitoring systems brought down, or to lose faith
in the security of a medical device, surveillance
system, or robot controller. Computer breaches can
cost money; insecure embedded systems can ruin
lives and careers.
That’s why Intel is at the forefront of securing
embedded systems with its three-part strategy.
First, there’s the secure silicon. Intel’s wildly popular
microprocessors
include
innumerable
features
that make the chips themselves secure, robust,
and trustworthy. Second, Wind River provides one
of the industry’s most trusted real-time operating
systems and embedded software, giving embedded
Greater Than the Sum of Its Parts
programmers a safe and secure foundation for
Everyone is familiar with Intel’s role in the personal
their products. And third, McAfee’s industry-leading
computer (PC) market, and how Intel’s breakneck
security technology – which often goes far beyond
pace of progress catapulted PCs into the mainstream
the familiar antivirus products – adds a tough layer
industry they are today. Less well known is Intel’s role in
of armor around modern embedded systems. All
embedded systems, the electronics that surround us and
three complement one another to provide something
drive the global infrastructure. From factory automation
greater than merely the sum of their parts. The
systems, to power generation, to wireless base stations,
Intel/Wind
and innumerable other ubiquitous systems, Intel chips
investment-grade components to engineering firms
power everything from the everyday to the exotic.
in any market.
Today’s embedded systems are as complex as
River/McAfee
combination
delivers
yesterday’s PCs. Indeed, sometimes they really are
Secure Silicon
like PCs, repurposed or redesigned to accommodate
Intel’s security suite starts with Intel chips, of course.
different embedded, industrial, medical, or high-
For decades, the family of Intel® architecture (“x86”)
reliability
microprocessor chips has included security features that
requirements.
More
often,
however,
2
Blue-Ribbon Development for Secure, Reliable Systems
MARKET OUTLOOK
other microprocessors just didn’t have. It starts with Intel
tools for the programmers and engineers who have
architecture’s four-level privilege hierarchy, which separates
to make these systems work. Wind River ’s tools
all software into four distinct privilege levels, or rings.
for development and debugging and its simulation
Programs can’t move outside their ring, so low-privilege
software can effectively make time stand still or even
programs can’t interrupt or interfere with higher-privileged
run backwards, allowing programmers to find and fix
code. These rules are enforced in the silicon itself, so they
bugs in uniquely powerful ways. Development teams
can’t be sidestepped, ignored, or thwarted by malicious
can work remotely, even across continents, and
code. These privilege rings have been a part of every
stay on the same page using full system simulators,
Intel architecture processor for 20 years, with continual
enabling around-the -clock development before
enhancements and improvements over that time.
hardware is even available. It’s a whole new level of
Then there’s the chips’ memory-protection units,
which prevent buggy (or malicious) programs from
full-system design, available now through Intel and
Wind River.
overwriting memory, possibly corrupting data, breaching
security, or causing failures. Like the privilege rings, Intel
McAfee* Security Layer
chips have offered memory protection for years, and it’s a
Viruses, worms, Trojans, and assorted malware used
feature that programmers have come to reply upon. Intel®
to be just the province of networked computers. But
processors also offer an execute-disable (XD) bit, a silicon
now everyday embedded systems are subject to
“on/off switch” that disables the ability to run arbitrary
the same attacks, and more. That’s why industrial-
software, one common vector for attacks. These features,
grade security technology is required for every type
and plenty more, make Intel architecture’s processor
of medical, industrial, automotive, communications,
family a safe, secure, and reliable foundation for even the
or aeronautic system. Any development team that
most mission-critical systems.
doesn’t design-in security from the outset is likely to
Wind River* Means Real Time
find itself starting over again, perhaps after a rude
introduction to their product’s security holes.
But the security features don’t stop there. Even safe and
Design teams can leverage McAfee’s software-
secure systems can fail. Bugs, programming mistakes,
based security in their own systems, hardening
and simple software errors can bring down a system
just as rapidly as a focused attack. That’s why reliable
commercial-grade software with built-in security
capabilities is so important for modern embedded
systems across market segments.
For more than 30 years, Wind River has been the bluechip standard with its real-time operating system (RTOS)
and broad portfolio of embedded software. First with its
VxWorks* product RTOS, later with its industry-leading
embedded Linux*, and now with its platforms for intelligent
systems, Wind River has been the preferred choice for
“McAfee* has been the
leader in computer
security for years, and
now that expertise is
focused on Intel-based
product development.”
engineering teams with an emphasis on reliability and
robustness. From the early days, Wind River software has
embedded products against viruses, denial-of-service
been optimized for Intel architecture processors, and that
attacks, network scans, Trojans, to name a few. The
connection is even stronger today.
company’s around-the-clock threat detection keeps
In addition to its runtime embedded software,
developersapprised of the latest outbreaks. Encryption
Wind River also provides top-grade development
and filtering technology help keep threats from
3
Blue-Ribbon Development for Secure, Reliable Systems
MARKET OUTLOOK
“The wisest investment a
product team can make
is to rely on the most
reliable and most secure
tools they can get.”
Summary
Product development has always been tough.
That’s why engineers and programmers are highly
compensated, and why good program managers build
good teams that are productive and efficient. But
now, with always-on Internet connections, numerous
wireless standards, ubiquitous connectivity, real-time
demands, regulatory approval, and shorter product
life cycles, those jobs became tougher still. With that
penetrating the system in the first place. It’s like having
solid foundation, developers can create new products
an entire company focused on protecting your system –
and new value. They can focus on their value-add, and
which is exactly what theydo. What embedded system
worry less about the basic details. Blue-chip companies
isn’t important enough to warrant that kind of security?
always were the best investment.
ABOUT INTEL
Intel (NASDAQ: INTC) is a world leader in computing innovation. The company designs and builds
the essential technologies that serve as the foundation for the world’s computing devices. Additional
information about Intel is available at www.intel.com/pressroom and blogs.intel.com.
© 2013 UBM Tech, a UBM company. All Rights Reserved.
© 2013 Intel Corporation. All Rights Reserved. Intel and the Intel logo are trademarks of Intel Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.
Information in this document is provided in connection with intel ® products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in intel’s terms and conditions of sale for such products, intel assumes no
liability whatsoever, and intel disclaims any express or implied warranty, relating to sale and/or use of intel products including liability or warran- ties
relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. A “Mission
critical application” is any application in which failure of the intel product could result, directly or indirectly, in personal injury or death. Should you
purchase or use intel’s products for any such mission critical application, you shall indemnify and hold intel and its subsidiaries, subcontractors
and affiliates, and the directors, officers, and employees of each, harmless against all claims costs, damages, and expenses and reasonable attorneys’ fees arising out of, directly or indirectly, any claim of product liability, personal injury, or death arising in any way out of such mission critical
application, whether or not intel or its subcontractor was negligent in the design, manufacture, or warning of the intel product or any of its parts.
Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked “reserved” or “undefined.” Intel reserves these for future definition and shall have no responsibility
whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not
finalize a design with this information. The products described in this document may contain design defects or errors known as errata which may
cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office
or your distributor to obtain the latest specifications and before placing your product order. Copies of documents which have an order number and
are referenced in this document, or other Intel literature, may be obtained by calling 1-800-548-4725, or by visiting Intel’s Web site at www.intel.com.
4