SlideShare a Scribd company logo
1 of 2
Download to read offline
DESIGNLINES
| MILITARY & AEROSPACE
DESIGNLINE
< https://www.eetimes.com/designline/military-
aerospace-designline/>
DARPA Looks to Automate Security for IC Design
By George Leopold < https://www.eetimes.com/author/george-leopold/> 05.27.2020 0
The latest in a series of Pentagon semiconductor initiatives seeks to embed security features into chip designs
that would allow silicon architects to probe economics-versus-security tradeoffs while baking in security
throughout device lifecycles.
The chip design effort represents continuing U.S. efforts to secure its electronics supply chain as
semiconductors emerge as a choke point in what is shaping up as a technological Cold War with China <
https://www.eetimes.com/tsmc-ariz-fab-a-tangled-web/> .
DARPA announced two teams this week to ramp up its year-old Automatic Implementation of Secure
Silicon (AISS) program < https://www.darpa.mil/news-events/automatic-implementation-of-secure-
silicon-proposers-day> led by Synopsys and Northrop Grumman. Both teams will develop Arm-based
architectures that incorporate a “security engine” used to defend against attacks and reverse-engineering of
chips. An upgradeable platform would provide the infrastructure that military planners say is needed to
manage hardened chips throughout their lifecycles.
Launched in April 2019, AISS is designed to
balance security and economic considerations
in securing the IC design process and chip
supply chains.
SPONSORED: A prominent leader in the
semiconductor memory technology
segment: Winbond <
https://www.eetimes.com/a-prominent-
leader-in-the-semiconductor-memory-
technology-segment-winbond/#>
Besides Arm, the Synopsys team includes
aerospace giant Boeing <
https://www.eetimes.com/boeing-flops-
again/> , the University of Florida’s Institute for
Cybersecurity, Texas A&M University,
University of California at San Diego, and U.K.-
based embedded analytics vendor UltraSoC < https://www.eetimes.com/ultrasoc-gets-6-3m-for-hardware-
level-cybersecurity/> .
Northrop Grumman heads a team that includes IBM, University of Arkansas and University of Florida.
The two-tiered effort includes competing “security engine” approaches that address key chip vulnerabilities
such as side channel attacks, hardware Trojans, reverse engineering and supply chain exploits. Side channel

Source: DARPA
 
attacks include tracking device power consumption as a means of stealing an encryption key.
In a later phase, the Synopsys team will seek to leverage EDA tools to integrate its security engine into SoC
platforms. The approach would combine “security-aware” EDA tools developed under the DARPA program
using commercial IP from Arm, Synopsys and UltraSoC.
Chip designers would then specify key constraints for power, area, speed and security for AISS tools. Those
tools would then “automatically generate optimal implementations based on the application objectives,”
program officials said.
“The ultimate goal of the AISS program is to accelerate the timeline from architecture to security-hardened
[register transfer level] from one year, to one week — and to do so at a substantially reduced cost,” said Serge
Leef, the DARPA’s program manager for AISS.
Ultimately, the agency hopes to automate the process of incorporating “scalable defense mechanisms into chip
designs” as it seeks to protect its semiconductor supply chain.
Related DoD technology efforts include industrial base initiatives aimed at securing U.S. chip supply chains
using digital twin capabilities that can validate integrity in either individual devices or a batch of chips. A
Defense Department/Air Force effort < https://www.eetimes.com/military-enlists-digital-twin-
technology-to-secure-chips/> announced earlier this year also would add a layer of secure “provenance
tracking” as well as the “heterogeneous integration” of chip types on a single die.
— George Leopold, the former executive editor of EE Times and the author of Calculated Risk: The
Supersonic Life and Times of Gus Grissom <
http://www.thepress.purdue.edu/titles/format/9781557538291> , also writes the EE Times Critical Path and
By the Numbers blogs.
Share this:
Twitter < https://www.eetimes.com/darpa-looks-to-automate-security-for-ic-design/?
share=twitter&nb=1>
Facebook < https://www.eetimes.com/darpa-looks-to-automate-security-for-ic-design/?
share=facebook&nb=1>
George Leopold
George Leopold has written about science and technology from Washington, D.C., since
1986. Besides EE Times, Leopold's work has appeared in The New York Times, New
Scientist, and other publications. He resides in Reston, Va.


Like this:
Loading...

More Related Content

Similar to DARPA Looks to Automate Security for IC Design

security_assessment_slides
security_assessment_slidessecurity_assessment_slides
security_assessment_slides
Steve Arnold
 
1Project 2 DeliverablesSecurity Assessment Report (SAR)I.
1Project 2 DeliverablesSecurity Assessment Report (SAR)I. 1Project 2 DeliverablesSecurity Assessment Report (SAR)I.
1Project 2 DeliverablesSecurity Assessment Report (SAR)I.
lauvicuna8dw
 
1Project 2 DeliverablesSecurity Assessment Report (SAR)I.
1Project 2 DeliverablesSecurity Assessment Report (SAR)I. 1Project 2 DeliverablesSecurity Assessment Report (SAR)I.
1Project 2 DeliverablesSecurity Assessment Report (SAR)I.
drennanmicah
 

Similar to DARPA Looks to Automate Security for IC Design (20)

security_assessment_slides
security_assessment_slidessecurity_assessment_slides
security_assessment_slides
 
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat PreventionWeb Development in Advanced Threat Prevention
Web Development in Advanced Threat Prevention
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
 
Security Analytics with OpenSearch
Security Analytics with OpenSearchSecurity Analytics with OpenSearch
Security Analytics with OpenSearch
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
1Project 2 DeliverablesSecurity Assessment Report (SAR)I.
1Project 2 DeliverablesSecurity Assessment Report (SAR)I. 1Project 2 DeliverablesSecurity Assessment Report (SAR)I.
1Project 2 DeliverablesSecurity Assessment Report (SAR)I.
 
1Project 2 DeliverablesSecurity Assessment Report (SAR)I.
1Project 2 DeliverablesSecurity Assessment Report (SAR)I. 1Project 2 DeliverablesSecurity Assessment Report (SAR)I.
1Project 2 DeliverablesSecurity Assessment Report (SAR)I.
 
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
 
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guideNUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
 
NAME's Appendix - L
NAME's Appendix - LNAME's Appendix - L
NAME's Appendix - L
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
 
World best web apps security and Active detection of malicious link
World best web apps  security and  Active detection of malicious linkWorld best web apps  security and  Active detection of malicious link
World best web apps security and Active detection of malicious link
 
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAMIT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 
Military Enlists Digital Twin Technology to Secure Chips
Military Enlists Digital Twin Technology to Secure ChipsMilitary Enlists Digital Twin Technology to Secure Chips
Military Enlists Digital Twin Technology to Secure Chips
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life Cycle
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
 

More from TJR Global

More from TJR Global (20)

Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...
Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...
Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...
 
The main ICT and cloud trend will be edge computing
The main ICT and cloud trend will be edge computingThe main ICT and cloud trend will be edge computing
The main ICT and cloud trend will be edge computing
 
Over 80% of IT leaders will adopt or expand cloud-based IAM and face challenges
Over 80% of IT leaders will adopt or expand cloud-based IAM and face challengesOver 80% of IT leaders will adopt or expand cloud-based IAM and face challenges
Over 80% of IT leaders will adopt or expand cloud-based IAM and face challenges
 
When Quantum Computing Meets Cloud Computing
When Quantum Computing Meets Cloud ComputingWhen Quantum Computing Meets Cloud Computing
When Quantum Computing Meets Cloud Computing
 
Cloud Security Challenges 2021
Cloud Security Challenges 2021Cloud Security Challenges 2021
Cloud Security Challenges 2021
 
Prioritizing The Cloud's Top Four Security Risks
Prioritizing The Cloud's Top Four Security RisksPrioritizing The Cloud's Top Four Security Risks
Prioritizing The Cloud's Top Four Security Risks
 
When it Comes to Cybersecurity and Compliance, there is no Room for Error
When it Comes to Cybersecurity and Compliance, there is no Room for ErrorWhen it Comes to Cybersecurity and Compliance, there is no Room for Error
When it Comes to Cybersecurity and Compliance, there is no Room for Error
 
Will AI replace cybersecurity teams completely?
Will AI replace cybersecurity teams completely?Will AI replace cybersecurity teams completely?
Will AI replace cybersecurity teams completely?
 
Why 2021 willl be the year of Adaptive Cybersecurity?
Why 2021 willl be the year of Adaptive Cybersecurity?Why 2021 willl be the year of Adaptive Cybersecurity?
Why 2021 willl be the year of Adaptive Cybersecurity?
 
Five tips for observability success amid cloud complexity
Five tips for observability success amid cloud complexityFive tips for observability success amid cloud complexity
Five tips for observability success amid cloud complexity
 
Is Serverless Computing Reafy to Go Mainstream?
Is Serverless Computing Reafy to Go Mainstream?Is Serverless Computing Reafy to Go Mainstream?
Is Serverless Computing Reafy to Go Mainstream?
 
The technologies driving business transformation in 2021
The technologies driving business transformation in 2021The technologies driving business transformation in 2021
The technologies driving business transformation in 2021
 
From Cloud Computing to Cooking: 4 Ways IT Mirrors Fine Cuisine
From Cloud Computing to Cooking: 4 Ways IT Mirrors Fine CuisineFrom Cloud Computing to Cooking: 4 Ways IT Mirrors Fine Cuisine
From Cloud Computing to Cooking: 4 Ways IT Mirrors Fine Cuisine
 
The Keys To Effective Cybersecurity, Accordiing To The Charter Of Trust
The Keys To Effective Cybersecurity, Accordiing To The Charter Of TrustThe Keys To Effective Cybersecurity, Accordiing To The Charter Of Trust
The Keys To Effective Cybersecurity, Accordiing To The Charter Of Trust
 
Eight Cybersecurity Lessons Learned From Life
Eight Cybersecurity Lessons Learned From LifeEight Cybersecurity Lessons Learned From Life
Eight Cybersecurity Lessons Learned From Life
 
Getting started with cloud computing: as review
Getting started with cloud computing: as reviewGetting started with cloud computing: as review
Getting started with cloud computing: as review
 
Every little thing you meed to lnow about cloud computing
Every little thing you meed to lnow about cloud computingEvery little thing you meed to lnow about cloud computing
Every little thing you meed to lnow about cloud computing
 
Top 10 cloud storage stories of 2020
Top 10 cloud storage stories of 2020Top 10 cloud storage stories of 2020
Top 10 cloud storage stories of 2020
 
Tech trends in 2021: Fast planes and home working
Tech trends in 2021: Fast planes and home workingTech trends in 2021: Fast planes and home working
Tech trends in 2021: Fast planes and home working
 
The US wants startups to get a piece of the $16 billion spent on space tech
The US wants startups to get a piece of the $16 billion spent on space techThe US wants startups to get a piece of the $16 billion spent on space tech
The US wants startups to get a piece of the $16 billion spent on space tech
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

DARPA Looks to Automate Security for IC Design

  • 1. DESIGNLINES | MILITARY & AEROSPACE DESIGNLINE < https://www.eetimes.com/designline/military- aerospace-designline/> DARPA Looks to Automate Security for IC Design By George Leopold < https://www.eetimes.com/author/george-leopold/> 05.27.2020 0 The latest in a series of Pentagon semiconductor initiatives seeks to embed security features into chip designs that would allow silicon architects to probe economics-versus-security tradeoffs while baking in security throughout device lifecycles. The chip design effort represents continuing U.S. efforts to secure its electronics supply chain as semiconductors emerge as a choke point in what is shaping up as a technological Cold War with China < https://www.eetimes.com/tsmc-ariz-fab-a-tangled-web/> . DARPA announced two teams this week to ramp up its year-old Automatic Implementation of Secure Silicon (AISS) program < https://www.darpa.mil/news-events/automatic-implementation-of-secure- silicon-proposers-day> led by Synopsys and Northrop Grumman. Both teams will develop Arm-based architectures that incorporate a “security engine” used to defend against attacks and reverse-engineering of chips. An upgradeable platform would provide the infrastructure that military planners say is needed to manage hardened chips throughout their lifecycles. Launched in April 2019, AISS is designed to balance security and economic considerations in securing the IC design process and chip supply chains. SPONSORED: A prominent leader in the semiconductor memory technology segment: Winbond < https://www.eetimes.com/a-prominent- leader-in-the-semiconductor-memory- technology-segment-winbond/#> Besides Arm, the Synopsys team includes aerospace giant Boeing < https://www.eetimes.com/boeing-flops- again/> , the University of Florida’s Institute for Cybersecurity, Texas A&M University, University of California at San Diego, and U.K.- based embedded analytics vendor UltraSoC < https://www.eetimes.com/ultrasoc-gets-6-3m-for-hardware- level-cybersecurity/> . Northrop Grumman heads a team that includes IBM, University of Arkansas and University of Florida. The two-tiered effort includes competing “security engine” approaches that address key chip vulnerabilities such as side channel attacks, hardware Trojans, reverse engineering and supply chain exploits. Side channel  Source: DARPA  
  • 2. attacks include tracking device power consumption as a means of stealing an encryption key. In a later phase, the Synopsys team will seek to leverage EDA tools to integrate its security engine into SoC platforms. The approach would combine “security-aware” EDA tools developed under the DARPA program using commercial IP from Arm, Synopsys and UltraSoC. Chip designers would then specify key constraints for power, area, speed and security for AISS tools. Those tools would then “automatically generate optimal implementations based on the application objectives,” program officials said. “The ultimate goal of the AISS program is to accelerate the timeline from architecture to security-hardened [register transfer level] from one year, to one week — and to do so at a substantially reduced cost,” said Serge Leef, the DARPA’s program manager for AISS. Ultimately, the agency hopes to automate the process of incorporating “scalable defense mechanisms into chip designs” as it seeks to protect its semiconductor supply chain. Related DoD technology efforts include industrial base initiatives aimed at securing U.S. chip supply chains using digital twin capabilities that can validate integrity in either individual devices or a batch of chips. A Defense Department/Air Force effort < https://www.eetimes.com/military-enlists-digital-twin- technology-to-secure-chips/> announced earlier this year also would add a layer of secure “provenance tracking” as well as the “heterogeneous integration” of chip types on a single die. — George Leopold, the former executive editor of EE Times and the author of Calculated Risk: The Supersonic Life and Times of Gus Grissom < http://www.thepress.purdue.edu/titles/format/9781557538291> , also writes the EE Times Critical Path and By the Numbers blogs. Share this: Twitter < https://www.eetimes.com/darpa-looks-to-automate-security-for-ic-design/? share=twitter&nb=1> Facebook < https://www.eetimes.com/darpa-looks-to-automate-security-for-ic-design/? share=facebook&nb=1> George Leopold George Leopold has written about science and technology from Washington, D.C., since 1986. Besides EE Times, Leopold's work has appeared in The New York Times, New Scientist, and other publications. He resides in Reston, Va.   Like this: Loading...