{"id":392,"date":"2025-03-21T06:58:42","date_gmt":"2025-03-21T11:58:42","guid":{"rendered":"https:\/\/www.qsigmainc.com\/?page_id=392"},"modified":"2025-03-21T06:58:42","modified_gmt":"2025-03-21T11:58:42","slug":"cybersecurity-2","status":"publish","type":"page","link":"https:\/\/www.qsigmainc.com\/?page_id=392","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Standard Definition of a cybersecurity adversary is anything that has the ability to: <strong>Execute and control the input of user programs in an operating system<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">QSigma\u2019s Expanded Definition of a cybersecurity adversary adds:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Anything that can gain operating system privileges over time without immediate detection<\/li>\n\n\n\n<li>security features alterable by system privileges are vulnerable!<\/li>\n\n\n\n<li>Anything that can alter compiled code at the assembly language level<\/li>\n\n\n\n<li>Anything that can alter manufacturing processes and inject back doors into hardware<\/li>\n\n\n\n<li>Anything that can configure data memory device which installs malware altering task and\/or program information when connected<\/li>\n\n\n\n<li>Anything that can send data messages that install malware altering task and\/or program information<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">The SiMulPro core thwarts all of these threats:<\/h2>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading\">Cybersecurity attacks that cannot happen by SiMulPro core design -Attacks altering instructions in a program<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Attacks altering function return stack<\/li>\n\n\n\n<li>Attacks using data leakage from leftover state after a program runs<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Detected and stopped using new circuits<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Read before write attacks<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Detected and stopped using new circuits and compiler stage tools<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Attacks using buffer overflow<\/li>\n\n\n\n<li>Attacks using illegal pointer references<\/li>\n\n\n\n<li>Dynamic allocation related attacks<\/li>\n\n\n\n<li>Attacks writing to Read Only Memory Object oriented specific attacks<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Prevented in design process using the SiMulPro core\u2019s operational features <\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Generation of back doors in chips<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Standard Definition of a cybersecurity adversary is anything that has the ability to: Execute and control the input of user programs in an operating system QSigma\u2019s Expanded Definition of a cybersecurity adversary adds: The SiMulPro core thwarts all of these &hellip; <a href=\"https:\/\/www.qsigmainc.com\/?page_id=392\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-392","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.qsigmainc.com\/index.php?rest_route=\/wp\/v2\/pages\/392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.qsigmainc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.qsigmainc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.qsigmainc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.qsigmainc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=392"}],"version-history":[{"count":1,"href":"https:\/\/www.qsigmainc.com\/index.php?rest_route=\/wp\/v2\/pages\/392\/revisions"}],"predecessor-version":[{"id":394,"href":"https:\/\/www.qsigmainc.com\/index.php?rest_route=\/wp\/v2\/pages\/392\/revisions\/394"}],"wp:attachment":[{"href":"https:\/\/www.qsigmainc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}