1 juin 2020 | International, C4ISR

DARPA Seeks Secure Microchip Supply Chain

"Once a chip is designed, adding security after the fact or making changes to address newly discovered threats is nearly impossible," explains a DARPA spokesperson.

By on May 29, 2020 at 2:46 PM

WASHINGTON: DARPA has launched a four-year project to find ways to design security features into microchips as they are being made to help ensure the future supply chain.

While the name of the project is daunting — Automatic Implementation of Secure Silicon (AISS) — and the technical requirements are a serious challenge, the concept is pretty simple.

“AISS aims to automate the process of incorporating security into chip designs, making it easier and potentially more cost effective for any organization with even a small design team (start-ups, mid-size companies, etc.) to build security measures into their designs,” a DARPA spokesperson told Breaking D today.

“Overall, with AISS DARPA aims to bring greater automation to the chip design process to profoundly decrease the burden of including security measures,” the spokesperson said.

The two winning teams, according to a May 27 DARPA press release, are:

The two AISS research teams are:

  • Synopsys, Arm, Boeing, Florida Institute for Cybersecurity Research at the University of Florida, Texas A&M University, UltraSoC, and the University of California, San Diego
  • Northrop Grumman, IBM, University of Arkansas, and University of Florida

“Research and development on the $75 million program was commenced two weeks ago and incremental capabilities are expected to roll out to the chip design community over the next four years,” the spokesperson said in an email. “Our hope is that many of the capabilities will start appearing as features in commercial design automation software before the program completion.”

Digital integrated circuits are the engines that drive modern computers, and everyday digital devices such as smart phones. They are critical to the evolution of the Internet of Things (IoT). As such, they increasingly have become a key target of hacking by US adversaries and cyber criminals alike, DARPA explains.

“Threats to IC chips are well known, and despite various measures designed to mitigate them, hardware developers have largely been slow to implement security solutions due to limited expertise, high cost and complexity,” the DARPA release says. “Further, when unsecure circuits are used in critical systems, the lack of embedded countermeasures exposes them to exploitation.”

Indeed, the Department of Commerce on May 15 took another swipe at Chinese telecoms behemoth Huawei and tightened its earlier efforts to block it from exporting its semiconductors and products to the US and allies. The Trump administration alleges that Huawei's hardware and software, in particular that related to 5G wireless technology, are full of deliberate security holes in order to enable Chinese government spying. The ruling by Commerce's Bureau of Industry and Security, which will take effect in September, seeks to prevent companies around the world from using American-made software and machinery develop chips for Huawei or its subsidiary firms.

The problem for device-makers, particularly in the IoT world where the market is largely for commercial products (think smart refrigerators), is that fixing potential security holes often isn't seen as worth the time, effort and most importantly, money.

“The inclusion of security also often requires certain trade-offs with the typical design objectives, such as size, performance, and power dissipation,” the DARPA spokesperson said. “For example, something like a sprinkler isn't likely to require the highest level of security protections. Investing in security mechanisms that take up a lot of space on the underlying chip, or significantly impact chip performance likely doesn't make sense based on the sprinkler's expected use and application.”

And yet, that future IoT sprinkler also will be other IoT devices and computer networks in operation by an individual, a company or a facility, such as a weapons depot.

Even more unfortunately, the spokesperson explained, “modern chip design methods are unforgiving – once a chip is designed, adding security after the fact or making changes to address newly discovered threats is nearly impossible.”

Thus, the AISS program is aimed at spurring research into two areas that can address four types of microchip vulnerability, the release says: “side channel attacks, hardware Trojans, reverse engineering, and supply chain attacks, such as counterfeiting, recycling, re-marking, cloning, and over-production.”

The first area of research will be focusing on “development of a ‘security engine' that combines the latest academic research and commercial technology into an upgradable platform that can be used to defend chips against attacks, and provide an infrastructure to manage these hardened chips as they progress through their lifecycle,” DARPA said.

The second area, led by software specialists Synopsys, “involves integrating the security engine technology developed in the first research area into system-on-chip (SOC) platforms in a highly automated way,” the DARPA release said. The Synopsys team also will be working on how to integrate new security designs and manufacturing tools with currently available off-the-shelf products.

Nicholas Paraskevopoulous, sector VP for emerging capabilities development at Northrop Grumman, said in a May 27 press release that the firm's “design tools will enable the development of secure and trusted integrated circuits with reduced costs.” Northrop Grumman is involved in the first AISS research area.

Synopsis could not be reached for comment by press time.

https://breakingdefense.com/2020/05/darpa-seeks-secure-microchip-supply-chain/

Sur le même sujet

  • US approves $150m Hellfire Missile sale to Netherlands

    6 février 2024 | International, Aérospatial

    US approves $150m Hellfire Missile sale to Netherlands

    Strengthening NATO: Netherlands is set to acquire 386 Hellfire Missiles in a Foreign Military Sale.

  • Elbit Systems Awarded Contract Worth Approximately $100 Million to Supply Intelligence and EW Aircraft to an International Customer

    18 avril 2023 | International, Aérospatial, C4ISR

    Elbit Systems Awarded Contract Worth Approximately $100 Million to Supply Intelligence and EW Aircraft to an International Customer

    As part of the contract, Elbit Systems will equip the aircraft with advanced Intelligence Mission Suite and EW capabilities

  • House progressives demand Pentagon cuts, citing pandemic

    21 mai 2020 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    House progressives demand Pentagon cuts, citing pandemic

    By: Joe Gould WASHINGTON ― More than two dozen Democrats are demanding that House Armed Services Committee leaders cut defense spending in the 2021 defense policy bill, saying the money would be better spent combating the coronavirus pandemic. A May 19 letter, mostly from Congressional Progressive Caucus members, marked a prelude to what could be complicated efforts to pass the National Defense Authorization Act in the Democrat-led House. The panel is expected in the coming weeks to introduce and mark up a draft, in line with the $740 billion top line set by the 2019 budget deal. But 29 Democrats ― led by House Progressive Caucus Co-Chair Mark Pocan of Wisconsin and Rep. Barbara Lee, a senior appropriator and California progressive ― said the defense spending should be lower than last year's $738 billion top line. With Americans dying from COVID-19 by the thousands, tax dollars would be better spent on an expansion of testing, contact tracing, treatment and vaccine development, they said. “Congress must remain focused on responding to the coronavirus pandemic and distributing needed aid domestically,” the lawmakers wrote. “In order to do so, appropriators must have access to increased levels of non-defense spending which could be constrained by any increase to defense spending.” “Right now, the coronavirus is our greatest adversary. It has killed more than 90,000 Americans, far surpassing the number of casualties during the Vietnam War,” the letter read. “America needs a coronavirus cure, not more war. We need more testing, not more bombs." How the loss of support from 29 House Democrats will factor into passage of the NDAA remains to be seen. In a note accompanying the letter, the organizers noted that if Republicans held back support ― which they did last year ― only 19 Democrats would need to vote “no” this year for the bill to fail. Last year, House Republicans resisted an early version of the 2020 bill written by House Democrats, but even after many of their priorities were stripped out in negotiations with the Republican-controlled Senate, the compromise bill still passed the House without them, 377-48. House Speaker Nancy Pelosi found common ground with the White House on an eleventh hour paid parental leave provision that attracted most Democrats. This year, House Armed Services Committee Chairman Adam Smith, D-Wash., has spoken in favor of working to protect the defense-industrial base through stimulus funding. But with a stimulus bill caught in a partisan deadlock, it's unclear whether lawmakers will see the NDAA as a potential vehicle for defense industry aid. If so, that could be a sticking point. Last month, Smith told reporters that public health needs were more pressing and that within the Pentagon's existing $738 billion budget, defense officials "have a lot of money and ought to spend that money to meet those needs” before Congress considers more. HASC ranking member Mac Thornberry, who led early Republican opposition to last year's bill, has said he is hopeful this year's bill will be more bipartisan. Thornberry, R-Texas, also opposed the idea of cutting defense to fund health care needs. “I bristle a bit at the notion, ‘well, of course [the Department of Defense has] got to get their budget cut,' " he said, “because the world's not going to be safer on the other side of COVID.” https://www.defensenews.com/congress/2020/05/19/house-progressives-demand-pentagon-cuts-citing-pandemic/

Toutes les nouvelles