Solar Energy News  
CYBER WARS
DARPA moving SSITH safeguards closer to practical use
by Staff Writers
Washington DC (SPX) Oct 21, 2021

"Lockheed Martin expects to spend the next two years transitioning HARD from the laboratory to a secure processor that we can integrate with other computing hardware, ultimately demonstrating SSITH's ability to protect real-world systems from exploitation."

DARPA's System Security Integration Through Hardware and firmware (SSITH) program is exploring hardware security architectures and tools that protect electronic systems against common classes of hardware vulnerabilities exploited through software, with the goal of breaking the endless cycle of software patch-and-pray.

To date, research on the program has focused on developing approaches and proving out concept that system-on-chip (SoC) designers can use to limit computer hardware to states that are secure while maintaining performance and power.

After rigorous testing and evaluation, researchers have proven that SSITH concepts provide robust hardware safeguards against known common weakness enumeration (CWE) classes of hardware vulnerabilities.

The SSITH program is now entering a final stage and is focused on transitioning and converting the proven concepts from lab discoveries to practical application. The team from Lockheed Martin Corporation is moving beyond virtual processors and aims to develop an application-specific integrated circuit (ASIC) that integrates a dual-core Arm processor and multiple peripheral interfaces with embedded security capabilities provided by their proven SSITH approach, known as Hardware Architecture Resilience by Design (HARD).

Lockheed Martin's HARD utilizes an approach to provide a hardware solution to protect systems against multiple classes of hardware vulnerabilities. Rather than perform "major surgery" on the CPU pipeline in order to implement new instructions or change the format of a pointer, the HARD approach utilizes a set of pipelines running in parallel to the primary CPU execution pathway to act as a parallel security co-processor, monitoring the main CPU and standing ready to flag any malicious operations.

Each pipeline monitors the stream of instructions executing on the main CPU pipeline, deriving the current semantic context based on expected patterns of instructions, and looking for any exploitation attempts.

HARD pipelines can be aggregated to deploy more or less security coverage as needed for the target environment, essentially enabling a user to only pay for what they need. In addition, because there is no need for major modifications to the primary CPU, HARD can be deployed to enforce security across any CPU architecture.

"By bringing HARD protections to an ASIC, we're bringing SSITH technology one step closer to practical use," said Keith Rebello, the program manager leading SSITH.

"Lockheed Martin expects to spend the next two years transitioning HARD from the laboratory to a secure processor that we can integrate with other computing hardware, ultimately demonstrating SSITH's ability to protect real-world systems from exploitation."


Related Links
System Security Integration Through Hardware and firmware (SSITH) program
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


CYBER WARS
US to curb hacking tool exports to Russia, China
Washington (AFP) Oct 20, 2021
US authorities unveiled Wednesday long-delayed new rules aimed at clamping down on export to nations like Russia and China of hacking technology amid a sharp uptick in cyberattacks globally. The rules, which are set to go into force in 90 days, would prevent the sale of certain software or devices to a list of countries unless approved by a bureau of the Commerce Department. "The United States opposes the misuse of technology to abuse human rights or conduct other malicious cyber activities, and ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Biofilters designed for space convert liquid manure into high-quality fertilisers

Crucial step identified in the conversion of biomass to methane

S-92 helicopter completes first flight using biofuel

Researchers want to breed a sorghum variety that captures more carbon

CYBER WARS
China may boost accuracy of its hypersonic weapons via AI technology

One giant leap for the mini cheetah

Singapore patrol robots stoke fears of surveillance state

Surgical robot with DLR technology on the market

CYBER WARS
US unveils plans for seven major offshore wind farms

From oil to renewables, winds of change blow on Scottish islands

Large wind farms cause different effects for local and regional climates

How do wind turbines respond to winds, ground motion during earthquakes?

CYBER WARS
Auto sector shifts gear towards recycling parts, batteries

Tesla profits surge on higher auto sales despite chip crunch

Lebanon's car culture questioned in crisis

Ghosn With the Wind

CYBER WARS
Induced flaws in quantum materials could enhance superconducting properties

UCLA bioengineers develop new class of human-powered bioelectronics

A new solid-state battery surprises the researchers who created it

Now everyone can build battery-free electronic devices

CYBER WARS
EDF offers to build up to 6 nuclear reactors in Poland

Steam leak detected at Russian nuclear plant

UK seeks to oust China from Sizewell nuclear plant: FT

Potential Deployment of BWRX-300 Small Modular Reactors in Poland

CYBER WARS
UK's Johnson outlines 30,000 green jobs boost

Hard choices loom for finance chiefs and their climate pledges

Rio Tinto says to 'halve' emissions by 2030

G20 leaders to address climate ahead of COP26: Italy

CYBER WARS
Ashes from Amazon transformed into city mural to raise climate awareness

Brazil, Colombia 'united' in defense of Amazon ahead of UN summit

Blinken, in Colombia, unveils Amazon deforestation pact

First European map of the insulating effect of forests









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.