You are here

FPGA Vulnerability Analysis Tools

Award Information
Agency: Department of Defense
Branch: Navy
Contract: N68335-19-C-0308
Agency Tracking Number: N19A-018-0159
Amount: $139,998.00
Phase: Phase I
Program: STTR
Solicitation Topic Code: N19A-T018
Solicitation Number: 19.A
Solicitation Year: 2019
Award Year: 2019
Award Start Date (Proposal Award Date): 2019-06-03
Award End Date (Contract End Date): 2019-12-09
Small Business Information
28 Dana Street
Amherst, MA 01002
United States
DUNS: 102221665
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 Kristopher Carver Kristopher Carver
 Technical Director
 (413) 359-0599
Business Contact
 Andras Moritz
Phone: (413) 359-0599
Research Institution
 University of Missouri - Kansas City
 Lawrence Dreyfus Lawrence Dreyfus
5100 Rockhill Road
Kansas City, MO 64011
United States

 (816) 235-5839
 Nonprofit College or University

BlueRISC's proposed solution takes the form of an automated toolkit that is able to analyze an FPGA bitstream with respect to exploitability. The solution relies on an FPGA-agnostic framework for automatically reverse-engineering an FPGA-bitstream into an intermediate representation (IR). This IR is FPGA agnostic and enables a program-analytic framework for extracting a fundamental FPGA-centric Vulnerability Model which can be visualized in the form of an FPGA Exploitability Graph. The proposed toolkit will also provide remediation guidance.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government