Blog

Type 1 Virtualization on ARM: Inevitable and Long Overdue

Often I am asked about what makes Cog Systems different, and how that will matter in the long term. By this point, this is an easy question for me – and the answer is as elegant as it is obvious. So, first, I suggest we all take a quick quiz. What is the single piece […]

Our Master Plan – The Inflection Point (Part 2)

Continuing from The Past is Prologue (Part 1). Since our founding days, our company’s purpose is to expedite the move to new technology and approaches that enables and encourages OEMs (the people who make devices) to construct more secure devices, while also enriching their functionality, and thereby enabling further innovation.  This would in turn would provide […]

Our Master Plan – The Past is Prologue (Part 1)

We’ve been doing some great things at Cog Systems and have an exciting vision for the future – our master plan – so I thought I’d share it with everyone in a couple of blog posts.  It’ll be fun.  Let’s see how it pans out over the next few years – I’ll probably be way […]

HTC, Secured by D4 Phone is Released

Just got back from the USA where we delivered some HTC D4 Secure phones to customers and showed them how to set them up. We didn’t have to show them how to use them because it’s actually hard to tell you’re using a non-stock Android phone. They all seemed interested and initially happy with the […]

SMMU support for NXP QorIQ ARM Processors

Operating systems and hypervisors use a processor’s MMUs to isolate processes and VMs alike. An often overlooked issue is DMA memory security; where a DMA capable device can be programmed to access memory in the system without being subject to MMU restrictions. This typically results in device drivers being used without security, or forcing them […]