29 mars 2019 | International, C4ISR, Sécurité, Autre défense

DARPA Seeks to Make Scalable On-Chip Security Pervasive

For the past decade, cybersecurity threats have moved from high in the software stack to progressively lower levels of the computational hierarchy, working their way towards the underlying hardware. The rise of the Internet of Things (IoT) has driven the creation of a rapidly growing number of accessible devices and a multitude of complex chip designs needed to enable them. With this rapid growth comes increased opportunity for economic and nation-state adversaries alike to shift their attention to chips that enable complex capabilities across commercial and defense applications. The consequences of a hardware cyberattack are significant as a compromise could potentially impact not millions, but billions of devices.

Despite growing recognition of the issue, there are no common tools, methods, or solutions for chip-level security currently in wide use. This is largely driven by the economic hurdles and technical trade-offs often associated with secure chip design. Incorporating security into chips is a manual, expensive, and cumbersome task that requires significant time and a level of expertise that is not readily available in most chip and system companies. The inclusion of security also often requires certain trade-offs with the typical design objectives, such as size, performance, and power dissipation. Further, modern chip design methods are unforgiving – once a chip is designed, adding security after the fact or making changes to address newly discovered threats is nearly impossible.

“Today, it can take six to nine months to design a modern chip, and twice as long if you want to make that same design secure,” said Serge Leef, a program manager in DARPA's Microsystems Technology Office (MTO). “While large merchant semiconductor companies are investing in in-house personnel to manually incorporate security into their high-volume silicon, mid-size chip companies, system houses, and start-ups with small design teams who create lower volume chips lack the resources and economic drivers to support the necessary investment in scalable security mechanisms, leaving a majority of today's chips largely unprotected.”

To ease the burden of developing secure chips, DARPA developed the Automatic Implementation of Secure Silicon (AISS) program. AISS aims to automate the process of incorporating scalable defense mechanisms into chip designs, while allowing designers to explore economics versus security trade-offs and maximize design productivity. The objective of the program is to develop a design tool and IP ecosystem – which includes tool vendors, chip developers, IP licensers, and the open source community – that will allow security to be inexpensively incorporated into chip designs with minimal effort and expertise, ultimately making scalable on-chip security pervasive.

Leef continued, “The security, design, and economic objectives of a chip can vary based on its intended application. As an example, a chip design with extreme security requirements may have to accept certain tradeoffs. Achieving the required security level may cause the chip to become larger, consume more power, or deliver slower performance. Depending on the application, some or all of these tradeoffs may be acceptable, but with today's manual processes it's hard to determine where tradeoffs can be made.”

AISS seeks to create a novel, automated chip design flow that will allow the security mechanisms to scale consistently with the goals of the design. The design flow will provide a means of rapidly evaluating architectural alternatives that best address the required design and security metrics, as well as varying cost models to optimize the economics versus security tradeoff. The target AISS system – or system on chip (SoC) – will be automatically generated, integrated, and optimized to meet the objectives of the application and security intent. These systems will consist of two partitions – an application specific processor partition and a security partition implementing the on-chip security features. This approach is novel in that most systems today do not include a security partition due to its design complexity and cost of integration. By bringing greater automation to the chip design process, the burden of security inclusion can be profoundly decreased.

While the threat landscape is ever evolving and expansive, AISS seeks to address four specific attack surfaces that are most relevant to digital ASICs and SoCs. These include side channel attacks, reverse engineering attacks, supply chain attacks, and malicious hardware attacks. “Strategies for resisting threats vary widely in cost, complexity, and invasiveness. As such, AISS will help designers assess which defense mechanisms are most appropriate based on the potential attack surface and the likelihood of a compromise,” said Leef.

In addition to incorporating scalable defense mechanisms, AISS seeks to ensure that the IP blocks that make up the chip remain secure throughout the design process and are not compromised as they move through the ecosystem. As such, the program will also aim to move forward provenance and integrity validation techniques for preexisting design components by advancing current methods or inventing novel technical approaches. These techniques may include IP watermarking and threat detection to help validate the chip's integrity and IP provenance throughout its lifetime.

AISS is part of the second phase of DARPA's Electronics Resurgence Initiative (ERI) – a five-year, upwards of $1.5 billion investment in the future of domestic, U.S. government, and defense electronics systems. Under ERI Phase II, DARPA is exploring the development of trusted electronics components, including the advancement of electronics that can enforce security and privacy protections. AISS will help address this mission through its efforts to enable scalable on-chip security.

DARPA will hold a Proposers Day on April 10, 2019 at the DARPA Conference Center, located at 675 North Randolph Street, Arlington, Virginia 22203, to provide more information about AISS and answer questions from potential proposers. For details about the event, including registration requirements, please visit: https://www.fbo.gov/index?s=opportunity&mode=form&id=6770487d820ee13f33af67b0980a7d73&tab=core&_cview=0

Additional information will be available in the forthcoming Broad Agency Announcement, which will be posted to www.fbo.gov.

https://www.darpa.mil/news-events/2019-03-25

Sur le même sujet

  • German brigade to be combat ready in Lithuania, on Russian border, in 2027
  • In Army’s newest unit, everyone learns cyber skills

    6 avril 2018 | International, C4ISR

    In Army’s newest unit, everyone learns cyber skills

    By: Mark Pomerleau Prior to its deployment to Afghanistan, the Army's newest unit received special assistance in cyber and electronic warfare techniques. The 1st Security Force Assistance Brigade, or SFAB, is a first of its kind specialized group designed solely to advise and assist local, indigenous forces. As such, these units need specialized equipment and received training from Army Cyber Command on offensive and defensive cyber operations, as well as electronic warfare and information operations, Army Cyber Command commander Lt. Gen. Paul Nakasone wrote in prepared testimony before the Senate Armed Services Cyber Subcommittee in early March. The distinct makeup of the unit ― smaller than a typical brigade and lacking all the resources and technical expertise therein ― means the operators at the tactical edge have to do the networking and troubleshooting themselves in addition to advising battalion sized Afghan units. The command's tailored support sought to advise SFAB personnel how best to leverage a remote enterprise to achieve mission effects, according to the spokesman. That means knowing how to perform electronic warfare and cyber tasks are part of every soldier's basic skill set. This was unique support with tailored training to meet the SFAB's advisory role mission, an Army Cyber Command spokesman said. Team members from Army Cyber Command specializing in offensive cyber and defensive cyber to serve as instructors during SFAB's validation exercise at the Joint Readiness Training Center at Fort Polk, Louisiana in January, a command spokesman told Fifth Domain. Electronic warfare personnel from 1st SFAB were also briefed on how cyber capabilities in use in Afghanistan currently support U.S. Forces. Specifically, the trainers provided the unit's communications teams best practices to harden networks. The Army Cyber Command team discussed planning factors working with down-range networks and mission relevant cyber terrain with the SFAB, specifically, the need to maintain situational awareness of the blue network and ability to identify key cyber terrain, the Army Cyber Command spokesman said. The unit was also given lessons on implementing defensive measure using organic tools. https://www.fifthdomain.com/dod/army/2018/04/05/in-armys-newest-unit-everyone-learns-cyber-skills/

  • Ozmen’s SNC selected as AC/MC-130J RFCM integrator by U.S Special Operations Command

    8 juillet 2020 | International, C4ISR

    Ozmen’s SNC selected as AC/MC-130J RFCM integrator by U.S Special Operations Command

    Centennial, Colo., July 2, 2020 – Sierra Nevada Corporation (SNC), the global aerospace and national security company owned by Eren and Fatih Ozmen, was selected by the U.S. Special Operations Command (USSOCOM) as the supplier for the AC-130J and MC-130J Radio Frequency Countermeasure (RFCM) program. The RFCM suite will provide special operation forces (SOF) operators with accurate and timely situational awareness information and improve aircraft survivability. “We are excited to expand our solutions for SOF warfighters,” said Bob Horky, Senior Vice President for SNC's ISR, Aviation and Security business area. “The aircraft they operate need the protection RFCM provides.” SNC will incorporate Northrop Grumman Corporation's RFCM system on aircraft to provide threat detection, precision geolocation, and active countermeasure capabilities. Advanced system processing and robust spectrum support significantly improve aircraft survivability in the modern threat environment. SNC's approach to aircraft survivability emphasizes full platform integration leveraging platform datalinks, integrated processing, and common tactical display systems. SNC used its electromagnetic and aerodynamic modeling expertise to maximize the performance of the installed system. SNC is a leading integrator for special mission aircraft, including USSOCOM AC‑130J and MC‑130J aircraft. As a significant supplier to the AC-130J Ghostrider Precision Strike Package and the prime contractor for the MC-130J Commando II Airborne Mission Networking systems, SNC brings novel approaches to integrating innovative technology to airborne platforms. SNC is committed to providing customers with full usage rights, breaking original equipment manufacturer (OEM) vendor lock and supporting maximized innovation, enhanced competition and reduced system life-cycle costs. For more information, visit www.sncorp.com About Sierra Nevada Corporation (SNC) Owned by Chairwoman and President Eren Ozmen and CEO Fatih Ozmen, SNC is a trusted leader in solving the world's toughest challenges through best-of-breed, open architecture engineering in Space Systems, Commercial Solutions, and National Security and Defense. SNC is recognized among The Top 10 Most Innovative Companies in Space, as a Tier One Superior Supplier for the U.S. Air Force and is the only aerospace and defense firm selected as a 2020 US Best Managed Company. For nearly 60 years, SNC has delivered state-of-the-art civil, military and commercial solutions including more than 4,000 space systems, subsystems and components to customers worldwide, and participation in more than 450 missions to space, including to Mars. View source version on Sierra Nevada Corporation (SNC): https://www.sncorp.com/press-releases/snc-selected-as-acmc-130j-integrator-by-ussocom/

Toutes les nouvelles