Secure, Trustworthy, Assured and Resilient Semiconductors and Systems (STARSS) Workshop
-
- Date:
- Wednesday, May 21, 2014, 6 p.m. — Thursday, May 22, 2014, 5 p.m. PT
- Location:
- Fairmont Hotel, Gold Room, 170 Market Street, San Jose, CA, United States
- Event ID:
- E005440
This invitation only T3S workshop will convene experts from industry, academia and government to assess the threats, capabilities and gaps related to secure, trustworthy, assured and resilient semiconductors and systems, and to identify research to improve these characteristics without unduly impacting cost or performance.
Organizing Committee
- Ron Perez, AMD
- Claire Vishnik, Intel
- Chris Daverse, SRC (Consultant)
- Celia Merzbacher, SRC
Wednesday, May 21, 2014 - Crystal Room | ||
---|---|---|
6:00 - 7:30 pm | Reception | |
Thursday, May 22, 2014 - Gold Room | ||
7:30 - 8:10 am | Breakfast | |
8:10 - 8:20 am | Welcome and Outline of Workshop Objectives | Celia Merzbacher / SRC |
8:20 - 8:40 am | Secure Systems: Hardware is the Answer | Benjamin Jun / Cryptography Research, Inc. a division of Rambus |
8:40 - 8:50 am | Results of Pre-Workshop Survey | Celia Merzbacher / SRC |
8:50 - 10:20 am | Panel 1 - Motivation for Action: What are the threats? What are the risks? What are the strategies for mitigation? (MODERATOR: Benjamin Jun / Cryptography Research, Inc. a division of Rambus) | |
Panelists | ||
10:20 - 10:40 am | Break | |
10:40 - 12:10 pm | Panel 2 - Capabilities and Gaps: What are the current approaches to system/hardware security? What are the limits? What are the gaps that research can help to address? (MODERATOR: John Villasenor / UCLA & Brookings Institution) | |
Panelists | ||
12:10 - 1:20 pm | Lunch | |
1:20 - 1:40 pm | Leviathan Redux (abstract) | John Manferdelli / Intel |
1:40 - 3:10 pm | Panel 3 - Vision for the Future: What are the ideal capabilities? Which are the highest priorities? (MODERATOR: Leendert van Doorn / AMD) | |
Panelists | ||
3:10 - 3:30 pm | Break | |
3:30 - 4:45 pm | Discussion of Research Needs: What are the Big Research Challenges to achieving the Vision? (DISCUSSION LEADER: William Joyner / SRC) | |
4:00 - 5:00 pm | Closing Remarks | Celia Merzbacher / SRC |
5:00 pm | Adjourn |
Our increasing reliance on interconnected, intelligent devices and systems is paralleled by growing concerns about potential threats to security, which involves the entire stack starting with a “hardware root of trust.” Diverse threats that may impact performance are posed by a variety of attackers with various motivations. These range from thieves who want to make money selling recycled chips as new to state-supported entities seeking to gain unauthorized access or control of national security systems. Attacks may target existing vulnerabilities or may entail tampering to modify functionality. The increase in use of third party design IP and the globalized supply chain lead to multiple points along the design and manufacture pathway where an attack may occur.
A challenge facing the industry is how to provide the level of assurance regarding security and trustworthiness required by the customer without unduly impacting performance or cost. Trustworthy and Secure Semiconductors and Systems (T3S) supports the development of strategies, techniques and tools for the design and manufacture of chips and systems that are reliable, trustworthy, secure and resistant to attack or counterfeiting. T3S addresses the root of the problem by funding basic university research that is fundamental to being able to provide assurance that hardware is trustworthy and secure.
T3S is an industry-led program; initial participants are AMD, Freescale, Intel and Mentor Graphics. In the initial phase of research, T3S is partnering with the National Science Foundation (NSF) to jointly fund research in Secure, Trustworthy, Assured and Resilient Semiconductors and Systems (STARSS) (http://www.nsf.gov/pubs/2014/nsf14528/nsf14528.htm)
This workshop is to refine and expand the research needs in this area, building on a workshop held in January 2013 (see link to report at /calendar/e004965/#tab-publications). Experts from industry, government and academia will provide insights on challenges and strategies for addressing them. The format will provide for active participation by all attendees, comprising three moderated panels with diverse perspectives and a final discussion on research needs. An output will be a public report on research needs that will serve as input to future T3S solicitations.
Name | Organization |
---|---|
Balacheff, Boris | HP Inc. |
Bell, Bob | Cisco Systems, Inc. |
Benoit, Olivier | Qualcomm |
Beraha, Rudy | Qualcomm |
Bhunia, Swarup | Case Western Reserve University |
Bieda, Jim | Cisco Systems, Inc. |
Borchert, Joerg M. | Infineon Technologies |
Brown, David A. | Intel Corporation |
Chandra, Vikas | Arm Limited |
Chen, Michael Y. | Siemens EDA |
Chian, Mojy C. | Silicon Cloud International |
Chopelas, Paul | Cypress Semiconductor |
Daverse, Chris A. | Semiconductor Research Corporation |
Dubrawsky, Ido | Itron, Inc. |
Dworak, Jennifer L. | Southern Methodist University |
England, Paul | Microsoft Corporation |
Fazzari, Saverio | Booz Allen Hamilton |
Forte, Domenic | University of Connecticut |
Freeman, Robert | Synopsys, Inc. |
Gantman, Alex | Qualcomm |
Gershman, Chuck | Intrinsix Corporation |
Gori, Christopher | Cryptography Research |
Graubart, Dave | Synopsys, Inc. |
Graybill, Robert | Nimbis Services, Inc. |
Grieco, Anthony H. | Cisco Systems, Inc. |
Harrison, William L. | University of Missouri - Columbia |
Heimann, John H. | Oracle Corporation |
Horst, Scott C. | U.S. Department of Defense |
Iqbal, Asif | Apple Inc. |
Jones, Scott | Maxim Integrated Products |
Joyner, William H. | Semiconductor Research Corporation |
Jun, Benjamin | Cryptography Research |
Karri, Ramesh | NYU Tandon School of Engineering |
King, Steven | U.S. Department of Defense |
Koushanfar, Farinaz | Rice University |
Leef, Serge | Siemens EDA |
Lu, Ting | Altera Corporation |
Manferdelli, John L. | Intel Corporation |
Manikantan Shila, Devu | United Technologies Corporation |
Mann, Jim | HP Inc. |
McConnell, Allen B. | Semiconductor Research Corporation |
McCune, Jon | Google Inc. |
McNeil, Steven | Xilinx, Inc. |
Merzbacher, Celia I. | Semiconductor Research Corporation |
Mukhopadhyay, Saibal | Georgia Institute of Technology |
Myrberg, Mats | Microsoft Corporation |
Narayanan, Pritish | IBM Corporation |
Newgard, Bruce | Xilinx, Inc. |
Ngo, Quoc X. | Lockheed Martin Corporation |
Nguyen, Robert A. | Intel Corporation |
Nikolich, Anita | National Science Foundation |
Oberg, Jason | Tortuga Logic |
Orshansky, Michael E. | University of Texas at Austin |
Paaske, Tim | Apple Inc. |
Perez, Ronald | Advanced Micro Devices, Inc. |
Pillitteri, Victoria | National Institute of Standards and Technology |
Plusquellic, Jim | University of New Mexico |
Potkonjak, Miodrag | University of California, Los Angeles |
Rachakonda, Anil | GlobalFoundries Inc. |
Rahman, Farhan | Advanced Micro Devices, Inc. |
Rhyne, Edward | U.S. Department of Homeland Security |
Sallam, Ahmed S. | Citrix Systems |
Salz, Arturo | Synopsys, Inc. |
Schaumont, Patrick | Virginia Polytechnic Institute and State University |
Schilder, Marius | Google Inc. |
Shannon, Gregory | Carnegie Mellon University |
Sherwood, Timothy | University of California, Santa Barbara |
Sonalker, Anuja | Battelle |
Suh, Gookwon Edward | Cornell University |
Swanson, Colleen | University of Michigan - Ann Arbor |
Tehranipoor, Mark M. | University of Connecticut |
Tousley, Scott | U.S. Department of Homeland Security |
Vagoun, Tomas | Networking and Information Technology Research |
Van Doorn, Leendert | Advanced Micro Devices, Inc. |
Villasenor, John D. | University of California, Los Angeles |
Vishik, Claire | Intel Corporation |
Walker, Jeremy G. | IOTA Computing |
Wang, Cliff | U.S. Army Research Office |
Weaver, John | Tectonic Labs |
West, Tony | Silicon Cloud International |
Zhao, Meiyuan | Intel Corporation |