22 juillet 2019 | International, C4ISR

DARPA Announces Microsystems Exploration Program

Over the past few decades, DARPA's Microsystems Technology Office (MTO) has enabled revolutionary advances in electronics materials, devices, and systems, which have provided the United States with unique defense and economic advantages. To continue its path of successful electronics innovation, DARPA today announced a new MTO effort called the Microsystems Exploration program. The Microsystems Exploration program will constitute a series of short-term investments into high-risk, high-reward research focused on technical domains relevant to MTO. Leveraging streamlined contracting and funding approaches, awards for each area of exploration – or μE topic – will be made within 90 days of announcement. Each μE topic will run for up to 18 months, during which time researchers will work to establish the feasibility of new concepts or technologies.

“This strategy of making smaller, targeted research investments will allow us to capitalize quickly on new opportunities and innovative research concepts,” said Dr. Mark Rosker, director of MTO. “The Microsystems Exploration program provides a way to assess whether or not a concept could evolve into a full program without requiring the use of more significant resources.”

The Microsystems Exploration program will employ best practices from DARPA's other fast-track solicitation programs – the agency-wide AI Exploration program and the Defense Science Office's “Disruptioneering” initiative. These programs are focused on enabling rapid advances in artificial intelligence and basic science respectively, and have shown numerous benefits to this approach. Similar to these efforts, the simplified proposal, contracting, and funding process employed by each μE topic will make it even easier for individuals and organizations to contribute to DARPA's mission. Each award may be worth up to $1 million, as described in the individual μE solicitations.

To help advance MTO's strategic imperatives, the Microsystems Exploration program will pursue innovative research concepts that explore frontiers in embedded microsystem intelligence and localized processing; novel electromagnetic components and technologies; microsystem integration for functional density and security; and disruptive microsystem applications in C4ISR, electronic warfare, and directed energy. In alignment with these technical domains, the first three potential topics focus on hardware security, novel materials, and new computing architectures for heterogeneous systems.

The first potential topic aims to address security issues within the hardware supply chain. Defense systems increasingly rely on commercial of the shelf (COTS) devices that move through complex supply chains, with each component changing hands several times. Throughout the process, nefarious actors have numerous opportunities to compromise the technology by introducing malicious circuitry – or hardware Trojans – to printed circuit boards (PCBs). The ability to detect when components are tampered with is difficult as the attacks are designed to remain hidden and avoid post-manufacturing tests until its functionality is triggered. The “Board-Level Hardware Security” related topic could explore the technological feasibility for real-time detection against these hardware Trojans installed in complex COTS circuit boards.

New uses of scandium (Sc)-doped aluminium nitride (AIN) could be investigated as a future potential μE topic. Sc-doped AlN is a popular material for a number of device applications, which span RF filters, ultrasonic sensors, and oscillators. Recent work has demonstrated the emergence of the material's use in ferroelectric switching, which has enormous potential across a number of applications and devices. However, current exploration of this capability has been limited to a research setting. The “Ferroelectric Nitride Materials and Non-Volatile Memory” related topic could expand on this research, identifying the thickness and doping ranges that exhibit ferroelectric behavior, the robustness and reproducibility of the ferroelectric response, and further demonstrating ferroelectric nitrides as a technologically useful material.

Another potential μE topic could seek to address the trade-off between programmer productivity and performance that happens as hardware complexity continues to skyrocket. Advances at the hardware and software level that have enabled continued progress in computing performance, cost, and ubiquity have hit a wall. The expectation is that subsequent performance gains will come from an increased level of parallelism, specialization, and system heterogeneity, which will place further strain on programmer productivity. This “Massively Parallel Heterogeneous Computing” related topic could explore the creation of compiler technology that improves programmer productivity of massively parallel and heterogeneous processing systems.

Additional information about the Microsystems Exploration program can be found under Program Announcement DARPA-PA-19-04. Further details on the three potential μE topics can be found under Special Notice DARPA-SN-19-69. The Microsystems Exploration Research Area Announcement Special Notice has been issued solely for information and potential new program planning purposes. All future and official solicitation notices for μE topics will be published to Federal Business Opportunities (FBO) at www.fbo.gov.

https://www.darpa.mil/news-events/2019-07-16

Sur le même sujet

  • DIU, Air Force pick four firms to prototype modular testing drone

    3 juin 2024 | International, Aérospatial

    DIU, Air Force pick four firms to prototype modular testing drone

    DIU and the Air Force want to use ETV in large numbers to “create an overwhelming dilemma" for an enemy, perhaps making it a candidate for Replicator.

  • Army selects companies to continue in long-range assault aircraft competition

    18 mars 2020 | International, Aérospatial

    Army selects companies to continue in long-range assault aircraft competition

    By: Jen Judson WASHINGTON — The Army has selected Bell and Sikorsky to enter into a competitive demonstration and risk reduction effort ahead of the start of the Future Long-Range Assault Aircraft, or FLRAA, program of record. The service is on a tight timeline to field a new long-range assault aircraft by 2030. The CDRR will consist of two phases that will last roughly one year each. The companies will deliver initial conceptual designs, an assessment of the feasibility of requirements and trade studies using model-based systems engineering. The competition for the program of record will begin in 2022 with a plan to field the first unit equipped in 2030. Congress added $76 million in funding to the aircraft program's top line in fiscal 2020 to drive down technical risk and speed up delivery. The money, which Congress approved as part of its FY20 appropriations bill signed into law in December, will fund the CDRR effort. The Army completed its Joint Multi-Role Technology Demonstration, or JMR TD, for which Bell and the Sikorsky-Boeing team each built aircraft to help the service understand what is possible for a future aircraft — mainly to replace the UH-60 Black Hawk. “These agreements are an important milestone for FLRAA,” Patrick Mason, the Army's aviation program executive officer, said in a statement issued March 16. “The CD&RR continues to transition technologies from the JMR-TD effort to the FLRAA weapons system design. We will be conducting analysis to refine the requirements, conceptual designs, and acquisition approach. Ultimately, this information and industry feedback are vital to understanding the performance, cost, affordability, schedule risks and trades needed to successfully execute the FLRAA program.” Bell has flown its V-280 Valor tilt-rotor demonstrator for two years in the JMR-TD and has logged more than 160 hours of flight time on the experimental aircraft. Sikorsky and Boeing's SB-1 Defiant coaxial demonstrator had a more difficult time getting off the ground due to issues in manufacturing its rotor blades. Its first flight was in March 2019. Even though Defiant has flown for a significantly reduced amount of time, the Army has determined it has enough data to move forward on its FLRAA program rather than extend the JMR TD to wait for the Sikorsky-Boeing team to log flight time. Brig. Gen. Wally Rugen, who is in charge of the service's future vertical lift modernization efforts, said last spring that because of the data collected through the JMR TD process as a well as additional studies and modeling, the service now thinks it has enough information to move more quickly into a full and open competition for FLRAA. Lt. Gen. Paul Ostrowski, the military deputy to the acquisition chief, said in a Senate Armed Services Airland Subcommittee hearing around the same time that the Army is presenting an acquisition strategy to the Pentagon's acquisition chief focusing on a nondevelopmental item approach to procuring FLRAA. That route, Ostrowski said, could lead to a competitive downselect by FY22. The extra funding provided by Congress will give the service the ability to continue to fly and burn down that inherent risk in developing a new helicopter. “What [that] may do as we hit those gates, is allow us to take what was going to be a primary budget, really a starting budget for the Army in ‘23 and ‘24, and potentially move that selection back to ‘23,” Rugen said recently. “We are not going to go to selection if, number one, we don't have requirements stable, we don't have resources stable, and, number two, the technology is not there.” The Army already has had a robust technology demonstrator program, including an extension, Rugen said, but that type of effort doesn't garner the same data as a prototype demonstration or a full-up weapon system. “In the CDRR [competitive demonstration and risk reduction], we're really trying to develop a weapons system, not the tech demonstrator,” Rugen said. “So we're trying to take it to the next level.” The CDRR will assess a laundry list of technologies identified through an Office of the Secretary of Defense-conducted independent technology readiness assessment, which would require additional evaluation to reduce risk, according to Rugen. Some of these technologies include the powertrain, drivetrain and control laws of the aircraft. “When we look at the software involved in flight controls, we have to really reduce risk there,” Rugen noted. The CDRR will also allow the Army to work on the integration of its mission systems. https://www.defensenews.com/land/2020/03/16/army-selects-companies-to-continue-on-in-long-range-assault-aircraft-competition/

  • New England guardsmen test their skills in Cyber Yankee 2020

    6 août 2020 | International, C4ISR, Sécurité

    New England guardsmen test their skills in Cyber Yankee 2020

    Mark Pomerleau Members of the National Guard from New England states concluded a two-week cyber exercise that sought to test the cyber skills of guardsmen and critical infrastructure operators. Cyber Yankee 2020, which took place July 21-31 in New Hampshire, involved more than 200 National Guard members and their civilian counterparts from across New England states, along with some active-duty partners and participants from local, state and federal agencies. In its sixth year, there was less attendance than previous years due to the coronavirus pandemic, but several were able to participate remotely. “Cyber Yankee is primarily a hands-on keyboard cyber incident response exercise for National Guard soldiers and airmen in FEMA Region 1, which are the six New England states,” said Lt. Col. Woody Groton, a member of the New Hampshire National Guard and the director for Cyber Yankee, according to a Facebook post by the New Hampshire Air National Guard. Groton said in a video that the exercise is primarily focused on the electrical and water sector. The exercise is “a great training opportunity for us to work with those people who would actually own the network that we would potentially respond on and for our soldiers and airmen to get that experience and for the engineers from those various entities, they get the training in working with us,” he said. The Guard units within the various states are a critical resource to defend against cyberattacks when they overwhelm localities. “If a large-scale attack happened against a power company, water company, or any other critical department around the state, we would be able to get activated and help them mitigate the threat,” Capt. Frederick Bond, 103rd Air Control Squadron cyberspace operator and exercise Team 3 lead from the Connecticut National Guard, said in a release. “It's similar to when a storm comes and we help remove fallen trees or shovel snow from roofs to help get critical infrastructure going again.” The friendly blue team had to deal with simulated attacks from an opposing red team. Social media posts were used to simulate a real internet environment, where forces must sift through the noise and discern what information is needed to make decisions and identify threat actors. In one case, these actors defaced a public website. “We found some discrepancies including website, it looks like it may have been defaced. The team is digging into finding the source of that defacement and then making steps to correct it,” Master Sgt. Eric Lewis, a blue team member in the New Hampshire Air National Guard, said in a video. Other actions tested included protecting computer files from being stolen or manipulated. “We received intel that potential threat actors may be using a certain capability to transfer files,” said Senior Airman Stephen LaLuna, 103rd Communications Flight cyber systems operations specialist with the Connecticut National Guard. “We see the traffic that's using it, that sets off a flag on our end to look deeper into that. If we determine it is malicious, we send it up the chain with our findings and recommendations to block it.” Officials explained that one of the most critical aspects of these training events is the partnerships built between Guard units, critical infrastructure operators and government entities so that when a crisis breaks out, everyone is acquainted. “We have built enduring partnerships with state government and the critical infrastructure sector. Something that if we did have a major cyberattack against one of those, we would be ready to respond and already know each other,” Groton said. Correction: An earlier version of this story misidentified Lt. Col. Woody Groton. He is with the Army National Guard. https://www.c4isrnet.com/cyber/2020/08/03/new-england-guardsmen-test-their-skills-in-cyber-yankee-2020

Toutes les nouvelles