Solar Energy News  
CYBER WARS
DARPA Seeks to Make Scalable On-Chip Security Pervasive
by Staff Writers
Washington DC (SPX) Mar 27, 2019

The image depicts the approach expected under the AISS program. The defenses under AISS will focus on securing the inner perimeter from four specific attack surfaces that are most relevant to digital ASICs and SoCs. These include side channel attacks, reverse engineering attacks, supply chain attacks, and malicious hardware attacks. The on-chip security engine AISS seeks to develop will aid designers in assessing which defense mechanisms are most appropriate based on the potential attack surface and the likelihood of a compromise.

For the past decade, cybersecurity threats have moved from high in the software stack to progressively lower levels of the computational hierarchy, working their way towards the underlying hardware. The rise of the Internet of Things (IoT) has driven the creation of a rapidly growing number of accessible devices and a multitude of complex chip designs needed to enable them.

With this rapid growth comes increased opportunity for economic and nation-state adversaries alike to shift their attention to chips that enable complex capabilities across commercial and defense applications. The consequences of a hardware cyberattack are significant as a compromise could potentially impact not millions, but billions of devices.

Despite growing recognition of the issue, there are no common tools, methods, or solutions for chip-level security currently in wide use. This is largely driven by the economic hurdles and technical trade-offs often associated with secure chip design. Incorporating security into chips is a manual, expensive, and cumbersome task that requires significant time and a level of expertise that is not readily available in most chip and system companies.

The inclusion of security also often requires certain trade-offs with the typical design objectives, such as size, performance, and power dissipation. Further, modern chip design methods are unforgiving - once a chip is designed, adding security after the fact or making changes to address newly discovered threats is nearly impossible.

"Today, it can take six to nine months to design a modern chip, and twice as long if you want to make that same design secure," said Serge Leef, a program manager in DARPA's Microsystems Technology Office (MTO). "While large merchant semiconductor companies are investing in in-house personnel to manually incorporate security into their high-volume silicon, mid-size chip companies, system houses, and start-ups with small design teams who create lower volume chips lack the resources and economic drivers to support the necessary investment in scalable security mechanisms, leaving a majority of today's chips largely unprotected."

To ease the burden of developing secure chips, DARPA developed the Automatic Implementation of Secure Silicon (AISS) program. AISS aims to automate the process of incorporating scalable defense mechanisms into chip designs, while allowing designers to explore economics versus security trade-offs and maximize design productivity.

The objective of the program is to develop a design tool and IP ecosystem - which includes tool vendors, chip developers, IP licensers, and the open source community - that will allow security to be inexpensively incorporated into chip designs with minimal effort and expertise, ultimately making scalable on-chip security pervasive.

Leef continued, "The security, design, and economic objectives of a chip can vary based on its intended application. As an example, a chip design with extreme security requirements may have to accept certain tradeoffs. Achieving the required security level may cause the chip to become larger, consume more power, or deliver slower performance. Depending on the application, some or all of these tradeoffs may be acceptable, but with today's manual processes it's hard to determine where tradeoffs can be made."

AISS seeks to create a novel, automated chip design flow that will allow the security mechanisms to scale consistently with the goals of the design. The design flow will provide a means of rapidly evaluating architectural alternatives that best address the required design and security metrics, as well as varying cost models to optimize the economics versus security tradeoff.

The target AISS system - or system on chip (SoC) - will be automatically generated, integrated, and optimized to meet the objectives of the application and security intent.

These systems will consist of two partitions - an application specific processor partition and a security partition implementing the on-chip security features. This approach is novel in that most systems today do not include a security partition due to its design complexity and cost of integration. By bringing greater automation to the chip design process, the burden of security inclusion can be profoundly decreased.

While the threat landscape is ever evolving and expansive, AISS seeks to address four specific attack surfaces that are most relevant to digital ASICs and SoCs. These include side channel attacks, reverse engineering attacks, supply chain attacks, and malicious hardware attacks.

"Strategies for resisting threats vary widely in cost, complexity, and invasiveness. As such, AISS will help designers assess which defense mechanisms are most appropriate based on the potential attack surface and the likelihood of a compromise," said Leef.

In addition to incorporating scalable defense mechanisms, AISS seeks to ensure that the IP blocks that make up the chip remain secure throughout the design process and are not compromised as they move through the ecosystem. As such, the program will also aim to move forward provenance and integrity validation techniques for preexisting design components by advancing current methods or inventing novel technical approaches. These techniques may include IP watermarking and threat detection to help validate the chip's integrity and IP provenance throughout its lifetime.

AISS is part of the second phase of DARPA's Electronics Resurgence Initiative (ERI) - a five-year, upwards of $1.5 billion investment in the future of domestic, U.S. government, and defense electronics systems. Under ERI Phase II, DARPA is exploring the development of trusted electronics components, including the advancement of electronics that can enforce security and privacy protections. AISS will help address this mission through its efforts to enable scalable on-chip security.

DARPA will hold a Proposers Day on April 10, 2019 at the DARPA Conference Center, located at 675 North Randolph Street, Arlington, Virginia 22203, to provide more information about AISS and answer questions from potential proposers. For details about the event, including registration requirements, please visit here


Related Links
Defense Advanced Research Projects Agency
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


CYBER WARS
China pursuing 'new world media order' to suppress criticism
Taipei (AFP) March 25, 2019
China is trying to establish a "new world media order" to prevent and counter criticism, a project that threatens press freedom globally, watchdog Reporters Without Borders (RSF) warned in a report released Monday. Communist authorities in China strictly control the flow of information to citizens, including through the "Great Firewall" which blocks access to websites and content deemed inappropriate by the state. But the bid to regulate information is not limited to China, and RSF said Beijing ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
UMD-Led researchers' wood-based technology creates electricity from heat

Plant scraps are the key ingredient in cheap, sustainable jet fuel

Making xylitol and cellulose nanofibers from paper paste

Bright skies for plant-based jet fuels

CYBER WARS
Dynamic hydrogel used to make 'soft robot' components and LEGO-like building blocks

Ankle exoskeleton fits under clothes for potential broad adoption

Using AI to build better human-machine teams

Seeing through a robot's eyes helps those with profound motor impairments

CYBER WARS
SeaPlanner to support marine coordination for Taiwan's Formosa I Offshore Wind Farm

E.ON announces start of construction on South Texas windfarm

DNV GL to deliver 5-minute energy forecast pilot for Australia's Ararat Wind Farm

Improved hybrid models for multi-step wind speed forecasting

CYBER WARS
European Parliament agrees cut to emissions from new cars

EU should build autos in US to avoid tariffs: Trump

New wheel units could bring vehicle costs down

Lyft revs up for an IPO seeking to raise $2.4bn

CYBER WARS
Energy monitor can find electrical failures before they happen

New research shows highest energy density all-solid-state batteries now possible

Speeding the development of fusion power to create unlimited energy on Earth

Advances point the way to smaller, safer batteries

CYBER WARS
China to start construction of its 1st floating nuclear power plant

EQUALLE group signs MoU to cooperate on qualification processes

RWE looks to 2019 to complete transformation

Team solves a beta-decay puzzle with advanced nuclear models

CYBER WARS
2018 spike in energy demand spells climate trouble: IEA

Forget about coal - broadband is the best bet for rural America

CO2 emissions in developed economies fall due to decreasing fossil fuel and energy use

S.Africa imposes severe power cuts ahead of election

CYBER WARS
Bolsonaro says Brazil owes world nothing on environment

Project promises to turn palm oil plantations back into rainforest in Borneo

USAID and NASA harness science, technology for Amazon sustainability

Floodplain forests under threat









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.