Integrity (operating system)

INTEGRITY
Developer Green Hills Software
OS family Real-time operating systems
Working state Current
Source model Closed source (classified)
Marketing target Embedded systems
Available in English
Platforms ARM, XScale, Blackfin, ColdFire, MIPS, PowerPC, IA-32, x86-64
Kernel type Microkernel
License Proprietary
Official website www.ghs.com/products/rtos/integrity.html

INTEGRITY and INTEGRITY-178B are real-time operating systems (RTOSes) produced and marketed by Green Hills Software.

INTEGRITY

INTEGRITY is POSIX-certified and intended for use in embedded systems of 32-bits or 64-bits. Supported computer architectures include variants of: ARM, Blackfin, ColdFire, MIPS, PowerPC, XScale, and x86.

INTEGRITY-178B

INTEGRITY-178B is the DO-178B–compliant version of INTEGRITY. It is used in several military jets such as the B-2,[1] F-16, F-22, and F-35, and the commercial aircraft Airbus A380.[2] Its kernel design guarantees bounded computing times by eliminating features such as dynamic memory allocation.

The auditing and security engineering abilities have allowed it to obtain the Evaluation Assurance Level (EAL) 6 rating by the National Security Agency (NSA).[2] The Target of Evaluation (TOE) Architecture in the Security Target for the evaluation excludes components such as those for file system and networking, from the definition of the TOE, focusing almost solely on the core kernel.[3] Other operating systems, such as Windows or Linux, though evaluated at lower levels of assurance, generally include these abilities within their TOE.

Supported processor architectures

The INTEGRITY Architecture Support Package (ASP) provides support for many processor families:

References

  1. "Board or bored? Lockheed Martin gets into the COTS hardware biz". VITA Technologies Magazine. December 10, 2010. Retrieved 9 March 2012.
  2. 1 2 Kelly Jackson Higgins (2008-11-18). "Secure OS Gets Highest NSA Rating, Goes Commercial". Dark Reading. Retrieved 2013-12-01.
  3. "Integrity-178B Separation Kernel Security Target" (PDF). SAIC. 2011-01-31. Retrieved 2011-03-22.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.