SlideShare a Scribd company logo
1/16/2020 Military Enlists Digital Twin Technology to Secure Chips | EE Times
https://www.eetimes.com/military-enlists-digital-twin-technology-to-secure-chips/ 1/1
DESIGNLINES | MILITARY & AEROSPACE DESIGNLINE< https://www.eetimes.com/designline/military-aerospace-designline/>
Military Enlists Digital Twin Technology to Secure Chips
By George Leopold < https://www.eetimes.com/author/george-leopold/> 01.02.2020 2
DOD’s industrial base initiative targets semiconductor supply chain.
The U.S. military is again attempting to secure the nation’s semiconductor supply chain with a handful of industrial base initiatives that include a
digital twin capability that used data-driven virtualization to validate the integrity of individual devices or an assembly of chips. That capability
would in turn help secure devices incorporated into weapons.
Among the recipients of Defense Department and Air Force industrial base funding is a small but growing Florida non-profit called BRIDG. The
public-private partnership recently received a $7.5 million contract from the Air Force Research Laboratory aimed at gathering data on chip
design and manufacturing processes. Among the goals is allowing military customers to establish the provenance of semiconductors using a
new digital twin capability.
Previously, BRIDG received a $20 million contract from the Defense Department’s Industrial Base Analysis and Sustainment Office <
https://www.businessdefense.gov/IBAS/Overview/> aimed at securing the microelectronics supply chain for critical infrastructure.
BRIDG is currently ramping up a 200-mm production line designed primarily for silicon components such as digital and RF interposers. Those
devices and other secure production capabilities target applications like sensors and optoelectronics.
Among the goals are developing secure designs and manufacturing processes to enable “heterogeneous integration” of different chip types on
a single die, according to Brett Attaway, BRIDG’s business development director. Using the digital twin approach, multiple systems that include
CPUs and memory chips could then be connected, prototyped and manufactured to boost performance while ensuring security.
As the partnership ramps up as a DoD-trusted facility with secure processes, “We see ourselves as part of the ecosystem for heterogeneous
integration,” Attaway noted in an interview. “There’s a gap to be filled in the DoD and aerospace community,” he added. “The gap is real. We
can enable next-generation systems” via a secure chip supply chain.
Along with digital twin manufacturing processes, the Air Force contract calls for BRIDG to develop security standards and manufacturing
processes. Those benchmarks would be used to protect against malicious functions inserted into mission-critical chips as well as spotting fake
chips < https://www.eetimes.com/audit-checklist-targets-fake-chips/> and intellectual property theft while boosting reliability.
Among the first deliverables under the Air Force contract is a product design kit for silicon interposers. Attaway said BRIDG expects to begin
delivering devices by the third quarter, with production on its 200-mm line ramping up by the end of 2020. The organization is licensing
interposer technology from IMEC, the chip R&D center based in Belgium.
Meanwhile, the emerging digital twin capability < https://www.eetimes.com/siemens-mentor-hows-it-working-out/> will leverage fab data
to create virtual chips model while designs progress through the production process. Along with improving chips production yields, the
approach also will add a layer of secure “provenance tracking,” Attaway said.
The goal of the Air Force effort, he added, is “improving the ecosystem for creating trusted and assured chips.”
George Leopold
George Leopold has written about science and technology from Washington, D.C., since 1986. Besides EE Times,
Leopold's work has appeared in The New York Times, New Scientist, and other publications. He resides in Reston, Va.

 

More Related Content

What's hot

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
syrinxtech
 
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp
 
Requirements Management for Safety-Critical Products
Requirements Management for Safety-Critical ProductsRequirements Management for Safety-Critical Products
Requirements Management for Safety-Critical Products
David Hetherington
 
PCI Compliance - What does it mean to me?
PCI Compliance - What does it mean to me?PCI Compliance - What does it mean to me?
PCI Compliance - What does it mean to me?
syrinxtech
 
Vodafone Internet of Things
Vodafone Internet of ThingsVodafone Internet of Things
Vodafone Internet of Things
M2M Alliance e.V.
 
Blockchain for Manufacturing Sector
Blockchain for Manufacturing SectorBlockchain for Manufacturing Sector
Blockchain for Manufacturing Sector
SuradhaIyer
 
Rapid Prototyping for IoT
Rapid Prototyping for IoT Rapid Prototyping for IoT
Rapid Prototyping for IoT
M2M Alliance e.V.
 
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
GlobalSign
 
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance Today: Status and News
FIDO Alliance Today: Status and News
FIDO Alliance
 
ECI Cyber Case Study EUW2017
ECI Cyber Case Study EUW2017ECI Cyber Case Study EUW2017
ECI Cyber Case Study EUW2017
ECI – THE ELASTIC NETWORK™
 
It practical file
It practical fileIt practical file
It practical file
Anirudh Tyagi
 
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Tyrone Systems
 
Modern Authentication for a Connected World
Modern Authentication for a Connected WorldModern Authentication for a Connected World
Modern Authentication for a Connected World
FIDO Alliance
 
A History of IIoT Cyber-Attacks
A History of IIoT Cyber-Attacks A History of IIoT Cyber-Attacks
A History of IIoT Cyber-Attacks
GlobalSign
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Intel® Software
 
SMEs innovation through future technologies
SMEs innovation through future technologiesSMEs innovation through future technologies
SMEs innovation through future technologies
IBTECAR
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
Anchises Moraes
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
FIDO Alliance
 
Infrastructure Auditing
Infrastructure AuditingInfrastructure Auditing
Infrastructure Auditing
syrinxtech
 
Web Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web ApplicationWeb Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web Application
Eryk Budi Pratama
 

What's hot (20)

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
 
Requirements Management for Safety-Critical Products
Requirements Management for Safety-Critical ProductsRequirements Management for Safety-Critical Products
Requirements Management for Safety-Critical Products
 
PCI Compliance - What does it mean to me?
PCI Compliance - What does it mean to me?PCI Compliance - What does it mean to me?
PCI Compliance - What does it mean to me?
 
Vodafone Internet of Things
Vodafone Internet of ThingsVodafone Internet of Things
Vodafone Internet of Things
 
Blockchain for Manufacturing Sector
Blockchain for Manufacturing SectorBlockchain for Manufacturing Sector
Blockchain for Manufacturing Sector
 
Rapid Prototyping for IoT
Rapid Prototyping for IoT Rapid Prototyping for IoT
Rapid Prototyping for IoT
 
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
 
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance Today: Status and News
FIDO Alliance Today: Status and News
 
ECI Cyber Case Study EUW2017
ECI Cyber Case Study EUW2017ECI Cyber Case Study EUW2017
ECI Cyber Case Study EUW2017
 
It practical file
It practical fileIt practical file
It practical file
 
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
 
Modern Authentication for a Connected World
Modern Authentication for a Connected WorldModern Authentication for a Connected World
Modern Authentication for a Connected World
 
A History of IIoT Cyber-Attacks
A History of IIoT Cyber-Attacks A History of IIoT Cyber-Attacks
A History of IIoT Cyber-Attacks
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
SMEs innovation through future technologies
SMEs innovation through future technologiesSMEs innovation through future technologies
SMEs innovation through future technologies
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
Infrastructure Auditing
Infrastructure AuditingInfrastructure Auditing
Infrastructure Auditing
 
Web Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web ApplicationWeb Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web Application
 

Similar to Military Enlists Digital Twin Technology to Secure Chips

Trust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT DevicesTrust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT Devices
ijtsrd
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET Journal
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
Cigdem Sengul
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
mariuse18nolet
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
LabSharegroup
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
Karel Van Isacker
 
General Version 8 Jul 09
General Version 8 Jul 09General Version 8 Jul 09
General Version 8 Jul 09
tverbeck
 
Unmanned aerial vehicle smart device ground control station cyber security th...
Unmanned aerial vehicle smart device ground control station cyber security th...Unmanned aerial vehicle smart device ground control station cyber security th...
Unmanned aerial vehicle smart device ground control station cyber security th...
Steph Cliche
 
Design of programmable hardware security modules for enhancing blockchain bas...
Design of programmable hardware security modules for enhancing blockchain bas...Design of programmable hardware security modules for enhancing blockchain bas...
Design of programmable hardware security modules for enhancing blockchain bas...
IJECEIAES
 
Internet of Things (IoT) Fog Computing Insights from Patents
Internet of Things (IoT) Fog Computing Insights from PatentsInternet of Things (IoT) Fog Computing Insights from Patents
Internet of Things (IoT) Fog Computing Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
Source Code Control Limited
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
Wendy Murphy
 
Mulin Holstein PKI-strategy
Mulin Holstein PKI-strategyMulin Holstein PKI-strategy
Mulin Holstein PKI-strategy
fEngel
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
Stéphane Roule
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
Nirmal Misra
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
voversbyobersby
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
BlockArmour1
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
jeffevans62972
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
odiliagilby
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Dalton Valadares
 

Similar to Military Enlists Digital Twin Technology to Secure Chips (20)

Trust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT DevicesTrust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT Devices
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
General Version 8 Jul 09
General Version 8 Jul 09General Version 8 Jul 09
General Version 8 Jul 09
 
Unmanned aerial vehicle smart device ground control station cyber security th...
Unmanned aerial vehicle smart device ground control station cyber security th...Unmanned aerial vehicle smart device ground control station cyber security th...
Unmanned aerial vehicle smart device ground control station cyber security th...
 
Design of programmable hardware security modules for enhancing blockchain bas...
Design of programmable hardware security modules for enhancing blockchain bas...Design of programmable hardware security modules for enhancing blockchain bas...
Design of programmable hardware security modules for enhancing blockchain bas...
 
Internet of Things (IoT) Fog Computing Insights from Patents
Internet of Things (IoT) Fog Computing Insights from PatentsInternet of Things (IoT) Fog Computing Insights from Patents
Internet of Things (IoT) Fog Computing Insights from Patents
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
 
Mulin Holstein PKI-strategy
Mulin Holstein PKI-strategyMulin Holstein PKI-strategy
Mulin Holstein PKI-strategy
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 

More from TJR Global

Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...
Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...
Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...
TJR Global
 
The main ICT and cloud trend will be edge computing
The main ICT and cloud trend will be edge computingThe main ICT and cloud trend will be edge computing
The main ICT and cloud trend will be edge computing
TJR Global
 
Over 80% of IT leaders will adopt or expand cloud-based IAM and face challenges
Over 80% of IT leaders will adopt or expand cloud-based IAM and face challengesOver 80% of IT leaders will adopt or expand cloud-based IAM and face challenges
Over 80% of IT leaders will adopt or expand cloud-based IAM and face challenges
TJR Global
 
When Quantum Computing Meets Cloud Computing
When Quantum Computing Meets Cloud ComputingWhen Quantum Computing Meets Cloud Computing
When Quantum Computing Meets Cloud Computing
TJR Global
 
Cloud Security Challenges 2021
Cloud Security Challenges 2021Cloud Security Challenges 2021
Cloud Security Challenges 2021
TJR Global
 
Prioritizing The Cloud's Top Four Security Risks
Prioritizing The Cloud's Top Four Security RisksPrioritizing The Cloud's Top Four Security Risks
Prioritizing The Cloud's Top Four Security Risks
TJR Global
 
When it Comes to Cybersecurity and Compliance, there is no Room for Error
When it Comes to Cybersecurity and Compliance, there is no Room for ErrorWhen it Comes to Cybersecurity and Compliance, there is no Room for Error
When it Comes to Cybersecurity and Compliance, there is no Room for Error
TJR Global
 
Will AI replace cybersecurity teams completely?
Will AI replace cybersecurity teams completely?Will AI replace cybersecurity teams completely?
Will AI replace cybersecurity teams completely?
TJR Global
 
Why 2021 willl be the year of Adaptive Cybersecurity?
Why 2021 willl be the year of Adaptive Cybersecurity?Why 2021 willl be the year of Adaptive Cybersecurity?
Why 2021 willl be the year of Adaptive Cybersecurity?
TJR Global
 
Five tips for observability success amid cloud complexity
Five tips for observability success amid cloud complexityFive tips for observability success amid cloud complexity
Five tips for observability success amid cloud complexity
TJR Global
 
Is Serverless Computing Reafy to Go Mainstream?
Is Serverless Computing Reafy to Go Mainstream?Is Serverless Computing Reafy to Go Mainstream?
Is Serverless Computing Reafy to Go Mainstream?
TJR Global
 
The technologies driving business transformation in 2021
The technologies driving business transformation in 2021The technologies driving business transformation in 2021
The technologies driving business transformation in 2021
TJR Global
 
From Cloud Computing to Cooking: 4 Ways IT Mirrors Fine Cuisine
From Cloud Computing to Cooking: 4 Ways IT Mirrors Fine CuisineFrom Cloud Computing to Cooking: 4 Ways IT Mirrors Fine Cuisine
From Cloud Computing to Cooking: 4 Ways IT Mirrors Fine Cuisine
TJR Global
 
The Keys To Effective Cybersecurity, Accordiing To The Charter Of Trust
The Keys To Effective Cybersecurity, Accordiing To The Charter Of TrustThe Keys To Effective Cybersecurity, Accordiing To The Charter Of Trust
The Keys To Effective Cybersecurity, Accordiing To The Charter Of Trust
TJR Global
 
Eight Cybersecurity Lessons Learned From Life
Eight Cybersecurity Lessons Learned From LifeEight Cybersecurity Lessons Learned From Life
Eight Cybersecurity Lessons Learned From Life
TJR Global
 
Getting started with cloud computing: as review
Getting started with cloud computing: as reviewGetting started with cloud computing: as review
Getting started with cloud computing: as review
TJR Global
 
Every little thing you meed to lnow about cloud computing
Every little thing you meed to lnow about cloud computingEvery little thing you meed to lnow about cloud computing
Every little thing you meed to lnow about cloud computing
TJR Global
 
Top 10 cloud storage stories of 2020
Top 10 cloud storage stories of 2020Top 10 cloud storage stories of 2020
Top 10 cloud storage stories of 2020
TJR Global
 
Tech trends in 2021: Fast planes and home working
Tech trends in 2021: Fast planes and home workingTech trends in 2021: Fast planes and home working
Tech trends in 2021: Fast planes and home working
TJR Global
 
The US wants startups to get a piece of the $16 billion spent on space tech
The US wants startups to get a piece of the $16 billion spent on space techThe US wants startups to get a piece of the $16 billion spent on space tech
The US wants startups to get a piece of the $16 billion spent on space tech
TJR Global
 

More from TJR Global (20)

Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...
Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...
Cloud Tech Innovations You May be Overlooking: Taking Advantage Of Microservi...
 
The main ICT and cloud trend will be edge computing
The main ICT and cloud trend will be edge computingThe main ICT and cloud trend will be edge computing
The main ICT and cloud trend will be edge computing
 
Over 80% of IT leaders will adopt or expand cloud-based IAM and face challenges
Over 80% of IT leaders will adopt or expand cloud-based IAM and face challengesOver 80% of IT leaders will adopt or expand cloud-based IAM and face challenges
Over 80% of IT leaders will adopt or expand cloud-based IAM and face challenges
 
When Quantum Computing Meets Cloud Computing
When Quantum Computing Meets Cloud ComputingWhen Quantum Computing Meets Cloud Computing
When Quantum Computing Meets Cloud Computing
 
Cloud Security Challenges 2021
Cloud Security Challenges 2021Cloud Security Challenges 2021
Cloud Security Challenges 2021
 
Prioritizing The Cloud's Top Four Security Risks
Prioritizing The Cloud's Top Four Security RisksPrioritizing The Cloud's Top Four Security Risks
Prioritizing The Cloud's Top Four Security Risks
 
When it Comes to Cybersecurity and Compliance, there is no Room for Error
When it Comes to Cybersecurity and Compliance, there is no Room for ErrorWhen it Comes to Cybersecurity and Compliance, there is no Room for Error
When it Comes to Cybersecurity and Compliance, there is no Room for Error
 
Will AI replace cybersecurity teams completely?
Will AI replace cybersecurity teams completely?Will AI replace cybersecurity teams completely?
Will AI replace cybersecurity teams completely?
 
Why 2021 willl be the year of Adaptive Cybersecurity?
Why 2021 willl be the year of Adaptive Cybersecurity?Why 2021 willl be the year of Adaptive Cybersecurity?
Why 2021 willl be the year of Adaptive Cybersecurity?
 
Five tips for observability success amid cloud complexity
Five tips for observability success amid cloud complexityFive tips for observability success amid cloud complexity
Five tips for observability success amid cloud complexity
 
Is Serverless Computing Reafy to Go Mainstream?
Is Serverless Computing Reafy to Go Mainstream?Is Serverless Computing Reafy to Go Mainstream?
Is Serverless Computing Reafy to Go Mainstream?
 
The technologies driving business transformation in 2021
The technologies driving business transformation in 2021The technologies driving business transformation in 2021
The technologies driving business transformation in 2021
 
From Cloud Computing to Cooking: 4 Ways IT Mirrors Fine Cuisine
From Cloud Computing to Cooking: 4 Ways IT Mirrors Fine CuisineFrom Cloud Computing to Cooking: 4 Ways IT Mirrors Fine Cuisine
From Cloud Computing to Cooking: 4 Ways IT Mirrors Fine Cuisine
 
The Keys To Effective Cybersecurity, Accordiing To The Charter Of Trust
The Keys To Effective Cybersecurity, Accordiing To The Charter Of TrustThe Keys To Effective Cybersecurity, Accordiing To The Charter Of Trust
The Keys To Effective Cybersecurity, Accordiing To The Charter Of Trust
 
Eight Cybersecurity Lessons Learned From Life
Eight Cybersecurity Lessons Learned From LifeEight Cybersecurity Lessons Learned From Life
Eight Cybersecurity Lessons Learned From Life
 
Getting started with cloud computing: as review
Getting started with cloud computing: as reviewGetting started with cloud computing: as review
Getting started with cloud computing: as review
 
Every little thing you meed to lnow about cloud computing
Every little thing you meed to lnow about cloud computingEvery little thing you meed to lnow about cloud computing
Every little thing you meed to lnow about cloud computing
 
Top 10 cloud storage stories of 2020
Top 10 cloud storage stories of 2020Top 10 cloud storage stories of 2020
Top 10 cloud storage stories of 2020
 
Tech trends in 2021: Fast planes and home working
Tech trends in 2021: Fast planes and home workingTech trends in 2021: Fast planes and home working
Tech trends in 2021: Fast planes and home working
 
The US wants startups to get a piece of the $16 billion spent on space tech
The US wants startups to get a piece of the $16 billion spent on space techThe US wants startups to get a piece of the $16 billion spent on space tech
The US wants startups to get a piece of the $16 billion spent on space tech
 

Recently uploaded

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 

Recently uploaded (20)

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 

Military Enlists Digital Twin Technology to Secure Chips

  • 1. 1/16/2020 Military Enlists Digital Twin Technology to Secure Chips | EE Times https://www.eetimes.com/military-enlists-digital-twin-technology-to-secure-chips/ 1/1 DESIGNLINES | MILITARY & AEROSPACE DESIGNLINE< https://www.eetimes.com/designline/military-aerospace-designline/> Military Enlists Digital Twin Technology to Secure Chips By George Leopold < https://www.eetimes.com/author/george-leopold/> 01.02.2020 2 DOD’s industrial base initiative targets semiconductor supply chain. The U.S. military is again attempting to secure the nation’s semiconductor supply chain with a handful of industrial base initiatives that include a digital twin capability that used data-driven virtualization to validate the integrity of individual devices or an assembly of chips. That capability would in turn help secure devices incorporated into weapons. Among the recipients of Defense Department and Air Force industrial base funding is a small but growing Florida non-profit called BRIDG. The public-private partnership recently received a $7.5 million contract from the Air Force Research Laboratory aimed at gathering data on chip design and manufacturing processes. Among the goals is allowing military customers to establish the provenance of semiconductors using a new digital twin capability. Previously, BRIDG received a $20 million contract from the Defense Department’s Industrial Base Analysis and Sustainment Office < https://www.businessdefense.gov/IBAS/Overview/> aimed at securing the microelectronics supply chain for critical infrastructure. BRIDG is currently ramping up a 200-mm production line designed primarily for silicon components such as digital and RF interposers. Those devices and other secure production capabilities target applications like sensors and optoelectronics. Among the goals are developing secure designs and manufacturing processes to enable “heterogeneous integration” of different chip types on a single die, according to Brett Attaway, BRIDG’s business development director. Using the digital twin approach, multiple systems that include CPUs and memory chips could then be connected, prototyped and manufactured to boost performance while ensuring security. As the partnership ramps up as a DoD-trusted facility with secure processes, “We see ourselves as part of the ecosystem for heterogeneous integration,” Attaway noted in an interview. “There’s a gap to be filled in the DoD and aerospace community,” he added. “The gap is real. We can enable next-generation systems” via a secure chip supply chain. Along with digital twin manufacturing processes, the Air Force contract calls for BRIDG to develop security standards and manufacturing processes. Those benchmarks would be used to protect against malicious functions inserted into mission-critical chips as well as spotting fake chips < https://www.eetimes.com/audit-checklist-targets-fake-chips/> and intellectual property theft while boosting reliability. Among the first deliverables under the Air Force contract is a product design kit for silicon interposers. Attaway said BRIDG expects to begin delivering devices by the third quarter, with production on its 200-mm line ramping up by the end of 2020. The organization is licensing interposer technology from IMEC, the chip R&D center based in Belgium. Meanwhile, the emerging digital twin capability < https://www.eetimes.com/siemens-mentor-hows-it-working-out/> will leverage fab data to create virtual chips model while designs progress through the production process. Along with improving chips production yields, the approach also will add a layer of secure “provenance tracking,” Attaway said. The goal of the Air Force effort, he added, is “improving the ecosystem for creating trusted and assured chips.” George Leopold George Leopold has written about science and technology from Washington, D.C., since 1986. Besides EE Times, Leopold's work has appeared in The New York Times, New Scientist, and other publications. He resides in Reston, Va.   