Kerry Bernstein, Program Manager Microsystem Technology …

26
Distribution A, Approved for Unlimited Distribution Our Annapurna Kerry Bernstein, Program Manager Microsystem Technology Office Indianapolis, IN 2 August, 2017 1

Transcript of Kerry Bernstein, Program Manager Microsystem Technology …

Page 1: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution

Our Annapurna Kerry Bernstein, Program Manager

Microsystem Technology Office

Indianapolis, IN

2 August, 2017

1

Page 2: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 2

Annapurna I ( 8091m ) Northeast Face Himalaya, Nepal

10th highest Peak in the world, first 8000m peak climbed. First Ascent 03 June 1950 by Maurice Herzog, Louis Lachenal

http://www.intrepidtravel.com/us/nepal/annapurna-sanctuary-102173

Page 3: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 3

“There are other Annapurnas in the lives of men.” Maurice Herzog From “Annapurna” 1952

Our Annapurna

What is our Annapurna?

https://www.amazon.com/Annapurna-Conquest-Highest-Mountain-Climbed/dp/ B00110CLBO/ref=sr_1_3?ie=UTF8&qid=1499616124&sr=8-3&keywords=annapurna+herzog

Page 4: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 4

The Nature of the Threat

Page 5: Kerry Bernstein, Program Manager Microsystem Technology …

Code Code Glass Chip Part Part Part Sale

Hardware-specific Exploits

Design Verification Mask Build Chip Build Pkg Test Pers Distr Use

3rd Party IP Insider Design EDA Exploit

IP Theft/Copy Security Intercept

LEGEND: Design Attack - Hardware Attack - Logistics Attack

Yield Fail Diversion Overproduction Process Compromise

Pkg Compromise

Yield Fail Diversion

False FPGA Bitstream

Malicious Insertions

Process Compromise

False Validation Report DFM Exploits

False Expects

SHIELD TRUST, IRIS False Test Compares

HW Theft

At OEM In Distribution

VHDL RTL GDSII PROCESS PKG PNP ID

IP Theft/Copy

Distribution A, Approved for Unlimited Distribution 6

Page 6: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 7

Exacerbating the Effect

Page 7: Kerry Bernstein, Program Manager Microsystem Technology …

The Global Nature of Today’s Supply Chains

Source: IDC Manufacturing Insights & Booz Allen analysis

Semi Design Semi Manufacturing & Packaging

Printed Circuit Board Production

Printed Circuit Board Distribution

Global nature of supply chain makes chain-of-custody unworkable

Lifecycle shown for a single Joint Strike Fighter component, which changes hands 15 times before final installation

Distribution A, Approved for Unlimited Distribution 8

Page 8: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 9

FPGA Evolution of Complexity *

1.E+02

1.E+03

1.E+04

1.E+05

1.E+06

1.E+07

Virtex Virtex-E Virtex-II Virtex-II/Pro Virtex-4/LX Virtex-4/FX Virtex-5/LXT Virtex-5/SXT Virtex-5/FXT Virtex-6/LXT Virtex-7/VT

1998 1999 2001 2003 2004 2005 2006 2007 2008 2009 2011

LogicCells RAM

16K BRAM; Diff Buffers; DCM; 18x18 Multiplier; PPC405; Integ. GTs

DSP slices; Hard FIFOs; SubFamilies

LUT6 Architecture; Hard PCIe

Gen2 PCIe; GTX/GTH

Unified Architecture; Stacked Silicon

* Data from https://forums.Xilinx.com/t5/Silicon-Devices-Others-Archived/Statistics-to-support-FPGAs-vs-multicore-CPUs-for-scientific/td-p/11995; KB/SM private communications

From “Three Ages of FPGAs”, Proceedings of the IEEE, Vol 103, No. 3, March 2015

Page 9: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 10

Complexity and FPGA “Effective” Span of Control

Successive BEOL “Span of Control” improvements enabled greater on-chip Logical Effort, and increasingly complex IP

From “Three Ages of FPGAs”, Proceedings of the IEEE, Vol 103, No. 3, March 2015

Page 10: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 11

DoD Acquisition Is a Man-made Challenge

“Defense acquisition revolves around 15-year programs, 5-year plans, 3- year management, 2-year Congresses, 18-month technologies, 1-year budgets, and thousands of pages of regulations.” Report to SecDef FY12-02

Image compliments of Defense Business Board

Page 11: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 12

CBP Data for Specific Shipments *

188

617

699

774 741

687 711

601

500

181

0

100

200

300

400

500

600

700

800

900

1000

0 500 1000 1500 2000 2500

Uni

que

Cons

igne

es

Unique Shippers

* Data courtesy of Adam Hauch, DSS Compilation by Kyle Bunch, Arnett Brown, Kerry Bernstein

Top 90th percentile of Chinese, Hong Kong Counterfeit Exporters to US 1999-2013 Operations, data being updated to YE2016

Page 12: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 13

The Current US Impact

Page 13: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 14

CBP Data for Specific Shipments *

1

513

3627

5740

7214 6976

5744 6579

4024

3481

833

0

100

200

300

400

500

600

700

800

900

1000

2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014

Num

ber

of U

niqu

e Co

nsig

nees

Year

Unique Consignees by Year and Number of Shipments

* Data courtesy of Adam Hauch, DSS Compilation by Kyle Bunch, Arnett Brown, Kerry Bernstein

Page 14: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 15

1

513

3627

5740

7214

6976

5744 6579

4024

3481

833

0

500

1000

1500

2000

2500

3000

2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014

Num

ber

of U

niqu

e Sh

ippe

r

Year

Unique Shippers by Year and Number of Shipments

CBP Data for Specific Shipments *

* Data courtesy of Adam Hauch, DSS Compilation by Kyle Bunch, Arnett Brown, Kerry Bernstein

Page 15: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 16

Counterfeit Destinations by State 2003-2013

14850

8206

1410

1378

843

765

644

540

304

286

257

241

204

194

184

169

161

159

149

119

116 111

109

76

68

61

56

2

2

1

12

13

38

10

15

8 12

6

9

54 Alaska 2 Hawaii 3

* Data courtesy of Adam Hauch, DSS Compilation by Kyle Bunch, Arnett Brown, Kerry Bernstein

Page 16: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 17

The Science and The Data

Page 17: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 18

Trends *

1.E+06

1.E+07

1.E+08

1.E+09

1.E+10

2008 2009 2010 2011 2012 2013 2014 2015 2016

Global Component Counterfeiting

DARPA Spending WW Counterfeiting (Est.)

* From “Qualification and Testing Process to Implement Anti-Counterfeiting Technologies into IC Packages” Nathalie Kae-Nune / Stephanie Pesseguier. STMicroelectronics, DATE13 Conference 3/28/13. Data compiled by S. Fazzari.

Effective use of limited funding is essential to address a threat 100X bigger and comprising 1% of global S/C Market.

Page 18: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 19

• 150 Logic Designers • 150 Design Validation Engineers • 50 Circuit Designers • 25-40 Physical Designers** • 20 Performance Verification Engineers • 20-40 CAD/EDA Programmers** • 10 Architects • 10 Design Leads • 10 Product Engineers • 10 Design-for-Test Engineers • 10 Timing Engineers • 5 Technologists • 5 Power Engineers

What It Currently Takes to Design a Chip

* Numbers from an actual product, assuming experienced engineers ** Count varies during design

Industry technical prowess is an on-shore national treasure which is critical to delivering first-time-right, reliable high-performance product.

Page 19: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 20

Relative Cost of Compromising a μProcessor

Distr Use Pkg/Test Pers

Chip Build

Mask Build

Verification Logic Design

Ckt/Phys Design

Pers

on-Y

ears

of

Effo

rt

1000 PY required for design of a high performance processor *

* Source: R. Wisnieff, J. Burns, IBM Research

Logical Equivalence Logical Vs Schematic Design Rules Check Electrical Rules Check C-Place/Wire Audit Parasitic Net Extraction Fault Isolation/Simulation Methodology Audit Static Timing Analysis Random Test Patt Gen AutoVerification Pgm

Est. t < 1.2 PY to engineer recent supply chain exploit Source: EE Times

Where would you attack a component?

Page 20: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 21

Mask Image Post-processing

RET, OPC, DFM, DFY, Cheesing/Fill are closely-held, proprietary fab algorithms. GDSII sent to the fab is NOT what gets fabricated.

https://nanohub.org/app/site/resources/2016/06/24507/slides/020.01.jpg http://semiengineering.com/wp-content/uploads/2014/11/Fig2_Fill_65nm_20nm_MG.jpg

http://semimd.com/wp-content/ uploads/2015/01/MP-F5.jpg

Page 21: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 22

• Inexpensive to fabricate - uses standard process • Authentication can be performed in the field for free • Has zero impact on the host reliability, lifetime, power, failure rate, yield, etc • Can be interrogated at any time, any place, with no special equipment or

training • Doesn’t require immediate connectivity to check • Entropy, Hamming Distances must be superior to the existing art • Requires zero error correction coding, margin, or tolerance • Provides trustworthy results within 2 seconds of interrogation • Must be unspoofable and side-channel secure • Must NEVER explicitly disclose or transmit its key or identity • Must remain more reliable than host, and stable over time • Must sense and report attempted compromises • Must self-destruct upon any attempt to compromise • Must be exquisitely difficult to reverse engineer • Exhibits a unique identity in each instantiation. • Tracks host’s physical and TCPIP location, movement through supply chain.

Required Characteristics for a useful PUF The bar is pretty high !

Page 22: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 23

Check Your Equipment! Features of Effective Logic Obfuscation

http://www.af.mil/News/Article-Display/Article/109833/team-of-airmen-to-attempt-mount-everest-climb/

1. Hides in Physics packages exquisitely resilient to Reverse Engineering

2. Does not provide a pointer to where the personalization is stored

3. Massively asymmetric, excessively high number of potential state machines

4. Reliable / Stable / persistent. Does not reveal itself temporally

5. Logically complete; can express arbitrary logic, doesn’t constrain minterm selection

6. Allows 100% test pattern coverage, fault isolation possible for shorts, opens

7. Personality doesn’t need to be expressed to fab; personalized post-manufacture

We depend on proven gear to keep the warfighter safe

First American Military Team on Mt. Everest

Page 23: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 24

Potential Solutions

Page 24: Kerry Bernstein, Program Manager Microsystem Technology …

25

Goal: Provide (DoD) with secure, trustworthy, leading-edge microelectronics to enable critical capabilities

How does DoD acquire leading-edge microelectronics?

DoD’s microelectronics supply chain relies on an evolving global enterprise of facilit ies and expertise to design, build, assemble, and deploy crit ical systems.

How can DoD ensure security while fully leveraging a globalized supply chain?

DARPA and other agencies are developing a technology-enabled portfolio of protections.

Defense Industry IARPA TIC eFuses / Proprietary

Classified Technology VAPR

CHIPS

DAHI SHIELD

IRIS/TRUST

CRAFT

Government- owned solutions

Fine Disaggregation and Transience

Functional Disaggregation

Obscuration and Marking

Verification and Validation

Government Intervention

Design Build Assemble Deploy

Government Intervention Government Intervention Government Intervention Government Intervention

Distribution A, Approved for Unlimited Distribution

Page 25: Kerry Bernstein, Program Manager Microsystem Technology …

Distribution A, Approved for Unlimited Distribution 27

1. Its all about practicing good science.

2. Threats to hardware security arise because of bigger problems.

Addressing them requires multiple solutions.

3. Technology asymmetry will always win – It’s why this threat currently exists. Let’s move this asymmetry to our side.

4. We need to quit pursuing solutions to academic, hypothetical, low probability exploits. Pay attention to actual cost of entry.

5. Let US Industry do what it does best - design, build, and protect. Leverage checking methodology we already have first.

6. We will be successful by working together, not separately.

Closing Observations

Page 26: Kerry Bernstein, Program Manager Microsystem Technology …

www.darpa.mil

28 Distribution A, Approved for Unlimited Distribution Distribution A, Approved for Unlimited Distribution