Lynx accelerates secure ADAS development with LynxSecure port -

Lynx accelerates secure ADAS development with LynxSecure port

Lynx Software Technologies is accelerating the development of secure ADAS vision and machine learning solutions in automotive, transportation and industrial applications. It announced, that LynxSecure 6.0, the latest version of its Separation Kernel Hypervisor has been ported to the NXP S32V, one of the industry’s most popular platforms for autonomous machine vision applications. 

LynxSecure is a true high assurance separation kernel virtualization technology founded on a unique robust design. LynxSecure 6.0 adds support for the Armv8-A architecture to existing Intel x86 support, providing military-grade security coupled with highly efficient virtualization to multi-core Arm SoC-based designs.

The virtualization and hardware protection capabilities of LynxSecure offer real-time performance while maintaining the highest levels of security. LynxSecure supports the 64-bit architecture of Armv8-A and allows for both 32 and 64-bit virtualized guest OSes to run without modification.  LynxSecure fully supports multi-core Arm SoCs by offering core-to-guest OS affinity, support for multi-core guest OSes, and core sharing across multiple guest OSes, enabling developers to take full advantage of multi-core systems.

Lynx Software Technologies was able to confirm that both its ARM and Intel LynxSecure customers’ are protected from Meltdown, the infamous hardware vulnerability that has exposed almost every other operating system based computer system on the planet. This is due to the decentralized approach of LynxSecure, where each guest computing environment is self-sufficient. The autonomy of each guest environment obviates the need for the kernel to provide global services. It is by the nature of the unique distributed autonomous design approach LynxSecure was immune to Meltdown, where attacker processes/VMs were able to derive kernel and guest private memory as a result of central service-oriented kernel designs that required access to all guest memory.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.