Home / Capabilities / Products
ECI Products
ECI provides cost-effective solutions to its customers by leveraging its innovative product tool suites.
EDAptive® EDASTAR™
EDAptive® EDAASSURE™
EDAptive® EDASHIELD™
The increasing complexity of military and commercial electronics systems, coupled with the frequent performance or operational requirements to upgrade or replace obsolete technology, has created a need for tools and techniques for cost effective and rapid replacement of components and systems. This need exists in both legacy systems as well as new systems in large measure because the pace of technology advancement is increasing faster than new systems and upgrades can be fielded. This condition also applies to complex processes, which must be frequently evaluated and optimized to meet the changing environments in which they operate. EDASTAR offers a suite of tools and methodologies that help close these gaps by facilitating rapid trade-off analysis, performance and risk assessment, and other automated analysis and visualization. This results in significant advantages to both the end users of these systems and processes, and those responsible for their maintenance.
EDASTAR is composed of a core modeling and analysis framework combined with a collection of plug-ins for meeting specific analysis needs relating to complex processes and systems. These modules provide the following technical core capabilities that can be evolved, combined and integrated to create specific solutions.
>
>
>
>
>
>
>
>
>
>
>
>
>
>
EDAptive® EDAASSURE™ is composed of formal methods based tools for design and system assurance. This includes an integrated tool suite for modeling, verification, and analysis of systems at both the architecture level and the software binary level. Using standard formats, EDAAssure can automatically import system representations and apply powerful, automated verification tools to check specific reliability and safety requirements. These tools are leveraged to provide:
>
>
>
EDAptive® EDASHIELD™ is an integrated, comprehensive suite of cyber security applications and tools that are designed to protect hardware and software assets throughout the five levels of technology abstraction in embedded and commercial applications. The five levels of technology abstraction are enterprise, system, board, chip, and code intellectual property (IP). Addressing each of these levels individually and all levels concurrently forms a broad, yet seamless, methodology to address vulnerabilities and enhance the overall security of all mission critical assets. EDASHIELD approaches each of the levels of technological abstraction individually, collectively, and also explores the arbitrary boundaries between the levels. The purpose of having a comprehensive, integrated approach to cyber security is to address the unique vulnerabilities or attack vectors at each individual level while addressing the gaps within and between levels, all the while being fully aware of the comprehensive cyber security architecture. Additionally, certain vulnerabilities cannot be addressed at the level where they are most malicious, but addressing those vulnerabilities at a level above or below can isolate the attack, thus minimizing the risk or optimizing the effectiveness of the security response. This comprehensive approach also points to the need to be completely aware of all security issues throughout a complex system’s life cycle.
EDASHIELD combines multiple technologies into one comprehensive, easy-to-use GUI-based tool suite. Its primary goal is to give design and development teams a clear path from start to finish towards the development of secure digital assets and systems. EDASHIELD also guides the implementation of security features into existing systems where possible instead of ad hoc patches. The ultimate benefit from the EDASHIELD suite is to provide the design team the guidance and ability to design, develop, and implement cyber security solutions for resilient architectures in a manner that cohesively addresses potential vulnerabilities at all levels of digital assets, regardless of the level of implementation.