You are here

FPGA Vulnerability Analysis Tools

Award Information
Agency: Department of Defense
Branch: Navy
Contract: N68335-20-C-0569
Agency Tracking Number: N19A-018-0056
Amount: $2,009,751.00
Phase: Phase II
Program: STTR
Solicitation Topic Code: N19A-T018
Solicitation Number: 19.A
Timeline
Solicitation Year: 2019
Award Year: 2020
Award Start Date (Proposal Award Date): 2020-07-30
Award End Date (Contract End Date): 2024-08-23
Small Business Information
531 Esty Street
Ithaca, NY 14850-3250
United States
DUNS: 603978321
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 Jason Dickens
 (607) 273-7340
 jdickens@grammatech.com
Business Contact
 Derek Burrows
Phone: (607) 351-5698
Email: dburrows@grammatech.com
Research Institution
 Brigham Young University
 Brent Nelson
 
Brigham Young University
Provo, UT 84602-2300
United States

 (801) 422-6455
 Nonprofit College or University
Abstract

Field programmable gate arrays (FPGAs) are becoming increasingly critical components in advanced electronic systems. However, limited research has been applied to identifying critical vulnerabilities that could be present in the designs deployed on these FPGAs. The risk is further increased by the use of 3rd party intellectual property in many designs. GrammaTech is proposing to develop a Trust verification framework to verify the trustworthiness of FPGA designs. Our solution will operate on the actual configuration bits of the FPGA to verify the design as deployed. Our approach will operate with limited prior design knowledge to physically locate and report on potential vulnerabilities and/or hardware Trojans in the FPGA design. It will also be flexible enough to support a top-down design verification methodology and expansion through additional analyses including formal verification methods. Our detection algorithms will be equally applicable for Trust verification of digital ASIC designs. GrammaTech is actively working to complement its leadership software vulnerability analysis tools with an equally robust tool-suite for hardware vulnerability analysis and enable unified reporting of system vulnerability analyses.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government