Defense Advanced Research Projects AgencyTagged Content List

Cyber

Relating to digital systems and information

Showing 3 results for Cyber + Microchips RSS
03/25/2019
For the past decade, cybersecurity threats have moved from high in the software stack to progressively lower levels of the computational hierarchy, working their way towards the underlying hardware. The rise of the Internet of Things (IoT) has driven the creation of a rapidly growing number of accessible devices and a multitude of complex chip designs needed to enable them. With this rapid growth comes increased opportunity for economic and nation-state adversaries alike to shift their attention to chips that enable complex capabilities across commercial and defense applications. The consequences of a hardware cyberattack are significant as a compromise could potentially impact not millions, but billions of devices.
05/27/2020
As Internet of Things (IoT) devices rapidly increase in popularity and deployment, economic attackers and nation-states alike are shifting their attention to the vulnerabilities of digital integrated circuit (IC) chips. Threats to IC chips are well known, and despite various measures designed to mitigate them, hardware developers have largely been slow to implement security solutions due to limited expertise, high cost and complexity, and lack of security-oriented design tools integrated with supporting semiconductor intellectual property (IP).
April 10, 2019, 9:00 AM EDT,
DARPA Conference Center
The Microsystems Technology Office is holding a Proposers Day meeting to provide information on our new Automatic Implementation of Secure Silicon (AISS) program. AISS will address the economic and technical challenges associated with building in chip security. The program aims to automate the process of incorporating scalable defense mechanisms into chip designs, while allowing designers to explore economics versus security trade-offs, and maximize design productivity. The objective is to develop a design tool and IP ecosystem – which includes tool vendors, chip developers, IP licensers, and the open-source community – that will allow security to be inexpensively incorporated into chip designs with minimal effort and expertise, ultimately making scalable on-chip security pervasive.