Cyber Supply Chain Risk Management
One of the most important aspects in managing the risks in the cyber supply chain is being able to verify the integrity of the different hardware and software modules, as they are vulnerable to cyber attacks at all level of the execution stack and throughout their life cycle. A novel integrity assessment and intrusion detection approach called power fingerprinting (PFP) is capable of extremely accurate and reliable detection of malicious intrusions, unauthorized modifications, and tampering in critical embedded systems. This revolutionary approach monitors the power consumption of digital systems to assess its execution status and detect, with extreme accuracy, when an unauthorized execution has managed to disrupt the normal operation of critical embedded systems. The objective of Phase I is to use demonstrate the ability of PFP to perform integrity analysis in different ICT components at different stages in the system life cycle to support cyber supply chain risk management. For Phase I the selected platform consists of a commercial development board similar in characteristics to a smart phone running the Android Operating System. To achieve this goal we will evaluate different techniques to extract reliable PFP signatures from trusted and alternatives references and use them for integrity assessment.
Small Business Information at Submission:
Power Fingerprinting, Inc.
2200 Kraft Drive, Suite 1200 R Blacksburg, VA -
Number of Employees: