White Papers

Trusted Governance Architectures for Secure AI Agents

Autonomous AI agents capable of reasoning, planning, and invoking external tools are increasingly deployed within enterprise and cloud environments. While these systems enable powerful automation scenarios, they also introduce significant security risks when language-model outputs can directly influence operational systems, credentials, or sensitive resources.

Read More »
White Papers

From HSM to Trusted Security Governance Platforms: Programmable Trust Anchors for Complex Digital Systems

This white paper introduces Trusted Security Governance Platforms (TSGP), a new class of security infrastructure designed to govern critical operations in complex digital systems.

Modern infrastructures such as cloud platforms, AI systems, large software supply chains and distributed environments introduce architectural challenges where security policies must be enforced across partially trusted infrastructures.

Read More »
White Papers

Trusted Security Governance for Secure AI Infrastructure

Artificial intelligence infrastructures concentrate large volumes of sensitive data, proprietary models and strategic operational knowledge.

Protecting these assets is challenging because AI workloads must process data in clear form during training and inference.

Read More »
White Papers

Isolate Security-Critical Applications on Zynq Ultrascale+ Devices

Isolate Security-Critical Applications on Zynq Ultrascale+ Devices This whitepaper, co-authored by Xilinx and ProvenRun, explains how implementing a TEE on the Zynq® UltraScale+™ platform (RFSoCs and s) greatly reduces the attack surface of security-critical applications. Explore this white paper to find out: What a TEE is, How the requirements for

Read More »
White Papers

Hypervisor and security

Hypervisor and security Connected devices that are part of the Internet of things are at risk of being remotely attacked. Performing such attacks require the exploitation of vulnerabilities in their Trusted Computer Base, the parts of the software and hardware that are critical to the devices’ security. Designing remote attacks

Read More »
White Papers

Deductive formal methods

Introduction Using deductive formal methods for ProvenCore, a secure operating system with a high-level interface for applications and for ProvenVisor, a secure hypervisor, makes it possible to reach a higher level of security while reducing the total costs of security. What we have done We have developed a secure OS

Read More »

Get Your White Paper

To get your white paper please fill out the form

Get Your White Paper

To get your white paper please fill out the form

Get Your White Paper

To get your white paper please fill out the form

Get Your White Paper

To get your white paper please fill out the form

Contact ProvenRun

We will be in touch with your shortly! Thank You.