ICS.png

ICS

Workers at Gas Plant
Purple City

Black Start

Pipelines

Adaptmicrosys Plans to Develop a Proactive Cybersecurity Framework for Energy Industry

Adaptmicrosys plan to develop a new way of "proactive protection" for enhancing organizational cybersecurity. It is anticipated that the proactive protection will secure information and various computer systems & devices connected via wire/wireless networks on the energy grid, gas pipeline, & other energy sectors by preventing unauthorized programs and cyber-attacks from being executed by processing units (i.e., CPUs) in the computer systems & devices without security software and hardware overheads. It will also replace software-based "reactive protections" employed today and will be a critical factor in "eliminating the resiliency of cybersecurity" for emerging & legacy energy delivery systems operating on information technology (IT) infrastructure. 

Problem in Energy Sectors:
The Cybersecurity Vulnerability & Protections in Energy Industry

  • Cybersecurity Vulnerability in Natural Gas Sectors

  • Cyber-attacks in Industrial Control Systems (ICSs)

  • Cyber-threats & Potential Preventions on ICS Networks: From IT to OT

  • Black Start: A Resilience Process after Unsuccessful Reactive Protections

 
calpu9.png

Advantages in our Technologies

iPUlogo.png

The iPU™ (immunized Processing Unit) is capable of

  • detecting & disabling unauthorized programs before running

  • responding, protecting regardless of types of cyber-attacks (no identification and recovery required) without any security software and overheads, including performance, power consumption, chip size and cost, etc.

  • running only programs authorized by users or authorized machines

  • operating without update, lag time, extra cost & communication, and more

  • operating fully automated & user friendly security without recurring cost

  • satisfying real-time protection for transportation systems

The CALPU™ (Compiler-Assisted Lookahead Processing Unit) is capable of running only authorized programs in a secure and efficient manner for

  • detecting unauthorized programs

  • eliminating branch prediction delays

  • discarding unnecessary flow-control instructions

  • reducing instruction fetch cycles while guaranteeing code compatibility

  • reducing energy consumption by employed Small Simple Low-Power Caches (SSL Caches)

  • applying for low-power, high-performance mobile and server computing systems (i.e. smartphones, tablets, servers, etc.)

Business Meeting

Thank you for reaching out to us!

contact us