BlueRISC Demonstrates its Mobile Roots-of-Trust Technology at the 2014 DHS Cyber Security Division R&D Showcase

Washington, DC, December 17, 2014 - BlueRISC provi... More...


BlueRISC Presents at the SINET Global Cybersecurity Innovation Summit in London

London, England, September 17, 2014 - BlueRISC pre... More...


BlueRISC Seeks Hardware/VLSI Architect/Designer Immediately

Amherst, MA, May 27, 2014 - BlueRISC seeks to fill... More...

keyBlueRISC Inc. was founded in 2002 to develop ironclad hardware-centric security and anti-tamper solutions for assuring software copy protection, enforcing intended use, defending against tampering, and protecting critical software and hardware IP. This spawned the TrustGUARD secure microprocessor which has its own complete hardware/software ecosystem spanning development, insertion, and runtime. With the rise of resource constrained embedded systems, BlueRISC has introduced the tinyTrustGUARD which provides the benefits of a secure microprocessor while requiring a minimal hardware footprint. Complementary to these solutions, BlueRISC offers hardware trojan detection technology at the hardware netlist level, which addresses the security risks of sourcing hardware components from  untrusted supply chains.

In addition to hardware-centric solutions, BlueRISC also provides software-based vulnerability detection and protection approaches for embedded systems, which includes the ability to heal software vulnerabilities at runtime as they are detected. In the mobile space, BlueRISC offers a secure kernel which acts as a root-of-trust in consumer mobile devices. Learn more about BlueRISC products.


Certain technical details regarding BlueRISC's solutions are purposefully withheld from this website.  For more information regarding our anti-tamper products, please contact us at This e-mail address is being protected from spambots. You need JavaScript enabled to view it .


Why BlueRISC? 

  • Most advanced hardware-centric solutions for digital-level anti tamper and cyber defense in computers and embedded systems
  • Intended-use and integrity enforcement, IP protection, and anti cloning with out-of-band protection
  • Security preservation independent of the operating system (OS)
  • Hardware roots of trust with ironclad security against in-wire and physical attacks
  • A comprehensive ecosystem with sophisticated tools for transparent insertion of technology, flexible add-on platforms, and options to embed