At-Scale Detection of Hardware Trojans on Chip Circuits
Navy SBIR 2020.1 - Topic N201-076
ONR - Ms. Lore-Anne Ponirakis - email@example.com
Opens: January 14, 2020 - Closes: February 12, 2020 (8:00 PM ET)
AREA(S): Electronics, Ground/Sea Vehicles, Information Systems
PROGRAM: Innovative Naval Prototype (INP) - Total Platform Cyber Protection
(TPCP), PMW-160, PMW-170
technology within this topic is restricted under the International Traffic in
Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and
import of defense-related material and services, including export of sensitive
technical data, or the Export Administration Regulation (EAR), 15 CFR Parts
730-774, which controls dual use items. Offerors must disclose any proposed use
of foreign nationals (FNs), their country(ies) of origin, the type of visa or
work permit possessed, and the statement of work (SOW) tasks intended for
accomplishment by the FN(s) in accordance with section 3.5 of the Announcement.
Offerors are advised foreign nationals proposed to perform on this topic may be
restricted due to the technical data under US Export Control Laws.
Develop a method to scan chips on devices at scale to detect malicious implants
known as hardware trojans. The Office of Naval Research (ONR) is seeking
approaches that are non-destructive, do not require chip removal, and can scan
boards and several devices in a timely fashion.
Within the Navy there is a push to improve cybersecurity at all levels from
application down to hardware. Many chips are made in other countries and
potential hardware trojans could either exfil information or disable critical
Navy systems such as weapons, communications, navigation, etc.
PHASE I: Demonstrate
through a physical proof-of-concept or a model/simulation that the proposed
approach is sound and feasible. The end result should be convincing from a
physics perspective and from an ability to conduct this operation at scale on
many chips. Develop a Phase II plan.
Develop a working prototype that is capable of maneuvering across a circuit
board to asses all the chips.
DUAL USE APPLICATIONS: It is expected that with the assistance of ONR, the
performer will work with an acquisition group such as PMW-160 or PMW-170 (or
another since this SBIR topic applies to many groups) to develop a system that
could be used by Navy personnel (civilian or military) to detect the presence
of hardware trojans on chips. A commercial device would also be appealing to
many U.S. manufacturers selling any number of technologies to both businesses
and consumers. Some examples include communications equipment, computers, and
Internet of Things (IoT) devices.
Nidish, Lu, Hangwei, Shi, Qihang, Rahman, Mir, Woodard, Damon L., Asadizanjani,
Navid and Tehranipoor, Mark. “Trojan Scanner Detecting Hardware Trojans with
Rapid SEM Imaging Combined with Image Processing and Machine Learning.” 44th
International Symposium for Testing and Failure Analysis, Phoenix,
Skorobogatov, Sergei and Woods, Christopher. “Breakthrough Silicon Scanning
Discovers Backdoor in Military Chip.” CHES 2012: Cryptographic Hardware and
Embedded Systems – CHES 2012 pp 23-40.
Paul and Scherrer, Paul. “3-D X-ray imaging makes the finest details of a
computer chip visible.” Paul Scherrer Institute, March 16, 2017.
Reverse Engineering; Hardware Trojan; Chip Scanning; Cybersecurity; Supply