Cog's security and virtualization APIs will be available in select Snapdragon mobile platforms, including the recently launched Snapdragon 855. This will enable connected devices, such as Android phones and IoT devices, to access Cog’s virtualized modular security technology, known as D4 Secure.
D4 Secure is a security and virtualization platform for connected devices. Cog’s virtualization enables end-point innovation through modularity and provides a platform for a variety of use cases like advanced biometrics, AI and machine learning algorithms, simultaneous dual OS, and others without compromising either security or performance.
To date, Cog’s products are used by more than 30 organisations globally, including General Dynamics and Northrop Grumman, as well as US and international government and defense agencies. This collaboration with Qualcomm Technologies is expected to help raise the company's profile with OEMs worldwide.
“Adding Cog’s virtualization technology to our chipset platforms enhances our already robust security and brings significant flexibility for our customers,” said Jesse Seed, Director of Product Management, Qualcomm Technologies. “Simplifying and securing the connected device ecosystem is critical and a key goal for both companies.”
“Qualcomm Technologies’ global reach will enable us to deliver secure-by-design as a global phenomenon rather than best practice,” Dr Daniel Potts, CEO of Cog Systems says.
Snapdragon 855, combined with the Snapdragon X50 modem, has been described as a breakthrough for 5G networks. Cog’s ‘secure by design’ approach is expected to enable new use cases that can be enabled as the OEMs embrace virtualization, while ensuring security as a core component of every new design.
Virtualization is rapidly becoming recognised as an important security approach around the world. Research from 2018 by the University of New South Wales under the leadership of Dr Gernot Heiser proved the long-held assumption that type 1 virtualization was the most secure approach by testing the impact the size of a device’s trusted computing base has on minimising critical threats. They developed a modular system built on sel4 and were able to completely eliminate 40% of the critical threats from the Common Vulnerability Assessments (CVE) database, while mitigating a further 59% to one degree or another.