You are here
FPGA Vulnerability Analysis Tools
Award Information
Agency: Department of Defense
Branch: Navy
Contract: N68335-19-C-0308
Agency Tracking Number: N19A-018-0159
Amount:
$139,998.00
Phase:
Phase I
Program:
STTR
Solicitation Topic Code:
N19A-T018
Solicitation Number:
19.A
Timeline
Solicitation Year:
2019
Award Year:
2019
Award Start Date (Proposal Award Date):
2019-06-03
Award End Date (Contract End Date):
2019-12-09
Small Business Information
28 Dana Street
Amherst, MA
01002
United States
DUNS:
102221665
HUBZone Owned:
No
Woman Owned:
No
Socially and Economically Disadvantaged:
No
Principal Investigator
Name: Kristopher Carver Kristopher Carver
Title: Technical Director
Phone: (413) 359-0599
Email: kris@bluerisc.com
Title: Technical Director
Phone: (413) 359-0599
Email: kris@bluerisc.com
Business Contact
Name: Andras Moritz
Phone: (413) 359-0599
Email: andras@bluerisc.com
Phone: (413) 359-0599
Email: andras@bluerisc.com
Research Institution
Name: University of Missouri - Kansas City
Contact: Lawrence Dreyfus Lawrence Dreyfus
Address:
Phone: (816) 235-5839
Type: Nonprofit College or University
Contact: Lawrence Dreyfus Lawrence Dreyfus
Address:
5100 Rockhill Road
Kansas City, MO
64011
United States
Phone: (816) 235-5839
Type: Nonprofit College or University
Abstract
BlueRISC's proposed solution takes the form of an automated toolkit that is able to analyze an FPGA bitstream with respect to exploitability. The solution relies on an FPGA-agnostic framework for automatically reverse-engineering an FPGA-bitstream into an intermediate representation (IR). This IR is FPGA agnostic and enables a program-analytic framework for extracting a fundamental FPGA-centric Vulnerability Model which can be visualized in the form of an FPGA Exploitability Graph. The proposed toolkit will also provide remediation guidance.
* Information listed above is at the time of submission. *