Trusted products and services for embedded security. Join-us on Linkedin

ProvenCore-M

A secure Real Time Operating System

Connected devices are increasingly facing cybersecurity issues originating from the lack of robustness of their software stacks, with hackers exploiting bugs and weaknesses, in particular of Operating Systems that is a weakest link of the Trusted Computing Base (TCB). 

Why use ProvenCore-M

ProvenCore-M is a secure Real Time Operating System (RTOS) that is dedicated to help security architects to design a highly secured TCB for hardware constrained microcontroller platforms. It brings an innovative answer to help companies developing smart products with high security assurance level at industrial cost.

More security

ProvenCore-M has been designed from the ground up to offer the best out-of-the box security and robustness concepts as applications are securely isolated from each other with full isolation of memory and resources

Maximize assurance

The RTOS relies on a microkernel architecture that has been hardened to get as close as possible to zero defects and to guarantee the expected security properties. Together, these attributes ease the path toward any required certifications. 

PSA compliant

ProvenCore-M supports the ARM Platform Security Architecture (PSA) concepts and Client APIs to ease application development and portability

Features

ProvenCore-M features a set of core security services:

  • Cryptographic library, compliant to PSA API
  • Secure storage for protecting keys and sensitive data
  • Secure firmware update management
  • Attestation
  • Secure time provider

Certification

ProvenCore-M is ready for PSA or SESIP Level 3 certification. 

Supported Hardware

ProvenCore-M is available for ARM Cortex-M v7 where it can be used as the main OS for a dedicated security module. ProvenCore-M is also available for ARM Cortex-M33 microprocessors, where it can be used as a Trusted Execution Environment (TEE) running in the ARM TrustZone root of trust. 

Please contact us for more details.

Challenge coverage

Security-by-design

Security-by-design

Security needs to be integrated at the design stage (security-by-design) and embedded in the most effective way wherever it is required in the technical infrastructure. There are many ways to embed security in systems and devices and the selected solution will be the result of a trade-off between cost, security level and performance.

More info
Trusted Computing Base

Trusted Computing Base

Security engineers define the Trusted Computing Base (TCB) as the set of hardware, firmware and software components that are critical to the security of a system. In order to limit the risk of vulnerabilities, the TCB need to be well identified, as small as possible and made-up of components that can be really trusted.

More info

Other Secure Components