SBIR-STTR Award

HERMES: Hardware attacks Evaluation, Resilience and Mitigation in Exemplar Systems
Award last edited on: 8/17/2024

Sponsored Program
SBIR
Awarding Agency
DOD : DARPA
Total Award Amount
$1,949,990
Award Phase
2
Solicitation Topic Code
AF191-063
Principal Investigator
Xiangrong Zhou

Company Information

Trusted Science and Technology Inc (AKA: Trusted ST~TrustedST)

5603 Grosvenor Lane
Bethesda, MD 20814
   (240) 308-2773
   contact@trustedst.com
   www.trustedst.com
Location: Single
Congr. District: 08
County: Montgomery

Phase I

Contract Number: FA8750-19-C-1020
Start Date: 8/16/2019    Completed: 8/16/2020
Phase I year
2019
Phase I Amount
$149,991
As modern mission systems store, process, and transport information and data for different purposes and user groups, the need for securing information boundaries becomes more critical. The proposed effort brings formally verified, open source technologies to improve cyber security and resiliency of military tactical systems against diverse vulnerabilities and prevent unauthorized information leakage.Information Flow,formal verification,seL4

Phase II

Contract Number: W912CG23C0022
Start Date: 6/9/2023    Completed: 7/8/2025
Phase II year
2023
Phase II Amount
$1,799,999
Secure systems rely on physical implementation of hardware and software systems, where various information leakage can be observed through various side channels and extracted with advance side channel analysis (SCA) algorithms. Recent advancement in computing, sensors, and SCA techniques have exposed new and more dangerous vulnerabilities. Hence a comprehensive SCA evaluation framework that can greatly facilitate side channel analysis for secure computing system and promote the side-channel aware software and hardware system security design and validation is highly desired. Proposed research effort is to design and develop a extendible SCA testbed which integrates state-of-the-are SCA techniques into secure computing system with internal/heterogeneous sensor and modern processor architectures with Trusted Execution Environment (TEE).