SBIR-STTR Award

Anti-Tamper Technology for Missile Defense
Award last edited on: 3/9/2015

Sponsored Program
SBIR
Awarding Agency
DOD : MDA
Total Award Amount
$1,149,426
Award Phase
2
Solicitation Topic Code
MDA11-018
Principal Investigator
James M Lewis

Company Information

Lewis Innovative Technologies Inc (AKA: LIT~LITI)

534 Lawrence Street
Moulton, AL 35650
   (256) 905-0775
   info@lewisinnovative.com
   www.lewisinnovative.com
Location: Multiple
Congr. District: 04
County: Lawrence

Phase I

Contract Number: ----------
Start Date: ----    Completed: ----
Phase I year
2012
Phase I Amount
$149,998
LIT will develop Silicon Modification Sensor (SMS) circuitry that is capable of detecting FIB processing or unauthorized changes to Integrated Circuit (IC) silicon. The SMS circuits will produce key material to be used to decipher CPI data and software. The SMS system is intended to operate as a part of the LIT Product Authentication Sensor System™ (PASS™). The detection of modification by the SMS produces an invalid key. In the complete AT solution, the SMS circuits provide an additional layer of protection in case all other security methods fail or are compromised. In Phase I, LIT will develop Silicon Modification Sensor circuits in FPGAs and test against simulated FIB attacks. In Phase II, LIT will test SMS against actual FIB processing.

Keywords:
Focused Ion Beam (FIB), FIB Processing, FIB Attack, Security Sensors, Silicon Modification Sensor, Programmable Logic Devices, Field Programmable Logic Devices

Phase II

Contract Number: ----------
Start Date: ----    Completed: ----
Phase II year
2013
Phase II Amount
$999,428
The goal of this research is to develop Unclonable Functions that will generate reliable cryptographic keys based on system characteristics. In the event of a reverse engineering attack, the encrypted configuration files, programs, and data will not be deciphered because the attack modifies the cryptographic keys. LIT?s goal is to develop Unclonable Functions that may be used in FPGAs or ASICs to allow protection for all types of silicon devices. These Unclonable Functions are sensitive to specific reverse engineering attacks including package modification and silicon modification.

Keywords:
Reverse Engineering, Unclonable Function, Tamper Detection, Tamper Response, System Security, Focused Ion Beam, Silicon Modification, Ic Packaging/Package Modification