We will create a proof-of-concept evaluation environment where white-hat hackers can create and test known and suspected Trojan circuits, evaluate their behaviors and impacts, and assess the Trojan circuits against various countermeasures. The appliance will be able to replicate or emulate, in hardware, a Trojan and its trigger in the context of a predetermined design; to discover methods to exercise, trigger, or expose that Trojan/trigger; to note the Trojans behavior and match it against the behavior of real circuits; and to evaluate that Trojan/trigger against countermeasures that would prevent it from disabling a semiconductor device.
Benefit: This Phase I project will produce emulation models of functional, data leak, or triggered Trojans that are truly representative of manipulation on the one hand, and can be easily inserted into a hardware emulation system on the other. Our ultimate objective is to create a solution that will mitigate critical security vulnerabilities in the hardware components of our national defense systems. In Phase I, we will begin with the development of core capabilities on a single design; we will do this in a way that is scalable and expandable to larger, system-level emulation environments. Specifically, after completion of Phase I, we will be well positioned to expand our preliminary subset of Trojan/trigger models to include representations of analog or parametric behavior such as temperature, noise, or GPS location, which are common elements of the battle environment. Our efforts in Phase I have broad applications beyond military uses. The more the activities of daily living depend on electronics and digital information cars, planes, smart electric grids, homes, manufacturing, the cloud, and the internet itself the greater the risk of hardware Trojans causing serious harm to our government, industry, and homes. Moreover, as economic or safety-of-life risks increase, the more companies will, as a question of competitive advantage, need to invest in electronic components that are Trojan-free, and pay special attention that the information system that is, the software and hardware have no built-in security threats. We believe that our solution meets an increasingly critical need to ensure hardware assurance in everyday smart devices.
Keywords: Integrated Verification and Validation, Integrated Verification and Validation, Security Information Event Management (SIEM), Secure Supply Chain Management, cybersecurity, Internet of Things (IoT), Hardware Assurance, Hardware Trojans