Amida’s Phase II prototype will be a “user system” comprised of an Evaluation Methodology, a Hardware Emulation Unit, and several software items (Trojan/Trigger Insertion, Instrument/ Countermeasure Insertion, Data Collection and Analysis, and an Evaluation Recommendation). It will be instantiated as a physical device and enable a user to evaluate a system in a virtualized and safe environment and explore the extent of the threat and corruption of any given Trojan/trigger combination (explore the attack surface). Once we evaluate a Trojan/trigger combination, we will then able to assess its threat impact and recommend potential detection enhancements and countermeasure tactics. We anticipate that the platform will be used: 1) to evaluate the security during the design and development process to enhance its “design-for-security” and help in hardening a given design or portion of a design; and 2) to operate a Golden Circuit to assess whether a “real in-service system” is behaving anomalously and if that behavior can be correlated to Trojan-emulated behavior for diagnosis.

See more here.



Is your company an OS AI Premium Member? Learn about all the benefits here. Packages start at $500.

How useful was this post?

Click on a star to rate it!

We are sorry that this post was not useful for you!

Let us improve this post!

Tell us how we can improve this post?

Leave a Reply