. 24/7 Space News .
CHIP TECH
DARPA Selects Teams to Increase Security of Semiconductor Supply Chain
by Staff Writers
Washington DC (SPX) May 29, 2020

AISS aims to automate the process of incorporating scalable defense mechanisms into chip designs, while allowing designers to explore chip economics versus security trade-offs based on the expected application and intent while maximizing designer productivity.

As Internet of Things (IoT) devices rapidly increase in popularity and deployment, economic attackers and nation-states alike are shifting their attention to the vulnerabilities of digital integrated circuit (IC) chips.

Threats to IC chips are well known, and despite various measures designed to mitigate them, hardware developers have largely been slow to implement security solutions due to limited expertise, high cost and complexity, and lack of security-oriented design tools integrated with supporting semiconductor intellectual property (IP).

Further, when unsecure circuits are used in critical systems, the lack of embedded countermeasures exposes them to exploitation. To address the growing threat this poses from an economic and national security perspective, DARPA developed the Automatic Implementation of Secure Silicon (AISS) program.

AISS aims to automate the process of incorporating scalable defense mechanisms into chip designs, while allowing designers to explore chip economics versus security trade-offs based on the expected application and intent while maximizing designer productivity.

DARPA is announcing the research teams selected to take on AISS' technical challenges. Two teams of academic, commercial, and defense industry researchers and engineers will explore the development of a novel design tool and IP ecosystem - which includes tool vendors, chip developers, and IP licensors - allowing, eventually, defenses to be incorporated efficiently into chip designs.

The expected AISS technologies could enable hardware developers to not only integrate the appropriate level of state-of-the-art security based on the target application, but also balance security with economic considerations like power consumption, die area, and performance.

"The ultimate goal of the AISS program is to accelerate the timeline from architecture to security-hardened RTL from one year, to one week - and to do so at a substantially reduced cost," said the DARPA program manager leading AISS, Mr. Serge Leef.

The two AISS research teams are:

+ Synopsys, Arm, Boeing, Florida Institute for Cybersecurity Research at the University of Florida, Texas A and M University, UltraSoC, and University of California, San Diego

+ Northrop Grumman, IBM, University of Arkansas, and University of Florida

"AISS is bringing together leading minds in security research and semiconductor design to focus on a problem of national importance," said Leef. "AISS will drive revolutionary advances in design productivity and have a dramatic and positive impact on our electronic supply chain security."

AISS consists of two primary research areas that address four fundamental silicon security vulnerabilities: side channel attacks, hardware Trojans, reverse engineering, and supply chain attacks, such as counterfeiting, recycling, re-marking, cloning, and over-production.

The first research area involves the development of a "security engine" that combines the latest academic research and commercial technology into an upgradable platform that can be used to defend chips against attacks and provide an infrastructure to manage these hardened chips as they progress through their lifecycle.

Synopsys and Northrop Grumman will each be developing Arm-based architectures that include security engines offering different approaches and demonstrating the modularity of the new AISS-based flows to accept other security engines, potentially including highly specialized engines developed for future Department of Defense (DoD) applications.

In addition, Northrop Grumman, along with IBM, will seek to further enhance technologies first developed under the DARPA Supply Chain Hardware Integrity for Electronics Defense (SHIELD) program. They will use these technologies as a starting point for the development of an Asset Management Infrastructure (AMI) to protect chips throughout their lifecycle.

The goal is to implement the AMI using distributed ledger technology, which provides for a high-availability, cloud-based system capable of managing keys, certificates, watermarks, policies, and tracking data to ensure that chips remain secure as they move through the design ecosystem.

Led by Synopsys, the second research area involves integrating the security engine technology developed in the first research area into system-on-chip (SOC) platforms in a highly automated way.

In effect, this second research area is focused on performing "system synthesis" or combining the new security-aware electronic design automation (EDA) tools developed under AISS with commercial off-the-shelf IP from Synopsys, Arm, and chip instrumentation specialist, UltraSoc.

This capability could allow chip designers to specify Power, Area, Speed, and Security (PASS) constraints on these AISS tools, which will then automatically generate optimal implementations based on the application objectives.


Related Links
Defense Advanced Research Projects Agency
Computer Chip Architecture, Technology and Manufacture
Nano Technology News From SpaceMart.com


Thanks for being there;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Monthly Supporter
$5+ Billed Monthly


paypal only
SpaceDaily Contributor
$5 Billed Once


credit card or paypal


CHIP TECH
'One-way' electronic devices enter the mainstream
New York NY (SPX) May 22, 2020
Waves, whether they are light waves, sound waves, or any other kind, travel in the same manner in forward and reverse directions - this is known as the principle of reciprocity. If we could route waves in one direction only - breaking reciprocity - we could transform a number of applications important in our daily lives. Breaking reciprocity would allow us to build novel "one-way" components such as circulators and isolators that enable two-way communication, which could double the data capacity o ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CHIP TECH
Barrett, Raymond speak with U.S. astronaut ahead of historic launch

US Space Council meets ahead of private, US crewed launch

Robert Polsgrove: Commercial Crew to Human Landers

Ultra-thin sail could speed journey to other star systems

CHIP TECH
SpaceX reaches for a new milestone in spaceflight

The UK's first complete ground rocket test in 50 years takes place in Scotland

NASA's SLS Core Stage Green Run tests critical systems for Artemis I

NASA astronauts arrive in Florida week before SpaceX flight

CHIP TECH
NASA's Curiosity Rover Finds Clues to Chilly Ancient Mars Buried in Rocks

The little tires that could go to Mars

NASA's Perseverance Rover goes through trials by fire, ice, light and sound

Mystery of lava-like flows on Mars solved by scientists

CHIP TECH
More details of China's space station unveiled

China's tracking ship Yuanwang-5 back from rocket monitoring mission

China's Kuaizhou rocket industrial park partially operational

China's experimental new-generation manned spaceship works normally in orbit

CHIP TECH
Harwell Space Cluster launches 10-year strategy to become UK Gateway to Space

Study explores space's impact on our daily lives

Strings of pearls in the night sky - the Starlink satellite project

India allows private firms, start-ups a sneak peek into ISRO data

CHIP TECH
Solving the space junk problem

New Army 3-D printing study shows promise for predictive maintenance

Designing a flexible material to protect buildings, military personnel

A primordial world of minerals litters Atacama desert

CHIP TECH
Terrestrial bacteria can grow on nutrients from space

ESO telescope sees signs of planet birth

Statistical analysis reveals odds of life evolving on alien worlds

New study estimates the odds of life and intelligence emerging beyond our planet

CHIP TECH
SOFIA finds clues hidden in Pluto's haze

New evidence of watery plumes on Jupiter's moon Europa

Telescopes and spacecraft join forces to probe deep into Jupiter's atmosphere

Newly reprocessed images of Europa show 'chaos terrain' in crisp detail









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.