Q: Are power supply attacks in scope for SSITH? A: The hacker team will not have physical access to the power supply.

Size: px
Start display at page:

Download "Q: Are power supply attacks in scope for SSITH? A: The hacker team will not have physical access to the power supply."

Transcription

1 SSITH FAQ Questions about the Scope of SSITH Q: Is securitization of external memory in the scope for SSITH? A: Yes. Please refer to BAA section I-B, page 6. Q: Is reverse engineering research of integrated circuits in scope for SSITH? A: No. Please refer to BAA section I-B, page 7. Q: Is the securitization of SoC applications in the scope for SSITH? A: Yes. Please refer to BAA section I-B, page 6. Q: Are quantum computing attacks in scope for SSITH? A: No. SSITH is confined to classical computing. Q: Are power supply attacks in scope for SSITH? A: The hacker team will not have physical access to the power supply. Q: Are row hammer attacks in scope for SSITH? A: Yes. Please refer to BAA section I-B, page 6. Q: Are electromagnetically induced side channel attacks in scope for SSITH? A: No. Please refer to BAA section I-B, page 7. Q: Are security performance monitors in scope for SSITH? A: Yes. Please refer to BAA section I-B, page 6. However, please note that any security performance monitors should be able to run on the FPGA demonstration platform. Q: Are government recommended algorithms, such as NSA/NIST approved encryption algorithms, considered in scope for SSITH? A: Yes. Q: Are attacks during boot up in scope for SSITH? A: Yes. Please refer to BAA section I-B, page 6. Q: Is data protection in scope for SSITH. A: Yes. Please refer to BAA section I-B, page 7. Q: Must all security solutions be formally verified? A: No, but each performer must demonstrate security assurance completeness.

2 Questions about Hardware/Software/OS Modification, Configuration, Architecture and IP Q: Within SSITH, are solutions that are implemented as a side or slave processor acceptable? A: A side processor is in scope. It would have to be possible for the slave processor to be integrated and run on the FPGA demonstration platform. Q: Can an application be recompiled to enable securitization? A: Yes, as long as the unmodified software can run on the securitized processor after being recompiled. In general, the less modification to software required to take advantage of security features, the better. Q: Within SSITH, can a performer modify the ISA? A: A performer can modify the ISA so long as the unmodified software that ran on the unmodified system still runs. Q: Will the performers be able to modify the operating systems in their system stack? A: Yes, as long as software that runs on the unmodified OS still runs successfully. Q: Can a user add a layer of software or firmware to the system to implement their security approach? A: Yes. PPASS impact of the intermediate layer will need to be evaluated. Q: Within SSITH, can a performer use a high level language IP such as CHISEL? A: Yes. Q: Will the standard applications that need to run natively be available to TA-1 performers? A: Yes. In general, all software that can run on the unmodified system should be executable on the securitized system. Q: How generalizable or scalable is the SSITH architecture expected to be? A: Please refer to BAA section I-D, page 8. Q: Can graceful failure be considered a design target of SSITH? A: Yes. It is expected that graceful degradation will be appropriately flexible for the scale and purpose of various systems. Q: Will the performers be expected to use an open source operating system? A: A fully specified OS will be provided to all performers as part of the FPGA evaluation exercise. Q: Will performers be permitted to add cache to their security architectures? A: So long as it is implementable on the FPGA demo platforms, and meets PPAS requirements, performers will be permitted to add or extend caching to their architectures. Q: Is proprietary IP allowed as part of a SSITH proposal? A: Yes. However, please refer to BAA section IV (page 36) for an explanation of the evaluation criteria.

3 Questions about CWE classes Q: How broad a solution does the proposer s architecture have to be? Does it have to address all seven CWE classes? A: By the last phase of the SSITH program, it expected that performers will address all seven CWE classes. Please refer to BAA Table 2. TA-1 Metrics by Phase for details. Questions about Proposing to TA-1 and/or TA-2 Q: Within SSITH, can a company propose to both TA-1 and TA-2 A: Yes. Please refer to BAA page 21, Section IV.B.1. Full Proposal Format. Q: Will it be possible to propose as a lead on TA-1 and a sub-contractor on TA-2? A: Yes. Questions about SSITH Program Structure Q: Will a required down selection be included in the SSITH Program? A: No. Q: How much visibility will a TA-2 team have within the SSITH Program? A: Please refer to BAA section III E, page 19. TA-2 Team(s) will have access to all TA-1 performer information that is required to establish/evaluate security metrics and develop hardware security representations. TA-2 Team(s) will be involved in regular TA-1 to TA-2 interactions. Q: Is security tool flow development to be included in TA-1 or TA-2. A: TA-1. Please refer to BAA section I-D, page 8. Questions about the Hacker Teams Q: If a proposer uses CHISEL or Bluespec, will the source code be presented to the hacker teams? A: During the evaluation, the hacker team will have access to the unsecuritized application, OS, and design. Any security modification to either the RTL or the FPGA bit stream will not be provided to the hacking teams. Q: Will the evaluator/hacker teams be permitted to use firmware attacks? A: Hacker teams will be permitted to use any software that is not embedded in the FPGA board/system. Q: Will the hacker/evaluator teams attack the unmodified design or the securitized design? A: The hacker teams will attack the securitized design.

4 Q: For the purposes of the hacker team testing, what will be considered a successful hack? A: When the hacker team can either exfiltrate unauthorized data, or modify the operation of the system in an unauthorized way, this will be considered a successful hack. Q: Hardware assisted secure boot would the hacker team be able to interrupt the secure boot bit stream? A: The hackers would not be permitted to interrupt the secure boot bit stream. Q: Will it be possible to add malicious code to the hacker system? A: Yes. Hacker teams will be able to use malicious code as long as the code is outside of the confines of the FPGA system. Q: What will the hacker teams have access to? A: The hacker team will have access to the system I/O ports and wireless connections. Hackers will not have access to anything within the FPGA box. Q: Will the hacker team have access to on-chip cryptographic keys in order to penetrate the systems under test? A: No. Q: Will clock glitching or power glitching by the hacker teams be permitted? A: Clock or power glitching will be allowed by the hacker teams as long as the glitching mechanisms are implemented through software. Questions about Tool Flow and IP Licensing Q: How should proposers deal with possible tool flow licensing and IP licensing? A: If IP or EDA tool licensing is required for SSITH development, include those costs in the proposal. Questions about the SSITH RISC V Demonstration Platforms Q: Is there going to be a tool chain that comes with the RISC V demonstration platform? A: Publically available RISC V tools (toolchain, ISA simulator) will be provided with the FPGA development kit. Q: Must performers demonstrate security function on all three RISC-V platforms that are provided? A: Yes. Please refer to BAA Table 1 on page 10.

5 Second FAQ for SSITH Q: The BAA currently states that the most complex design will be a full featured, multi-threaded, out of order execution RISC-V processor. Is the most complex design to be addressed within SSITH a single core but multi-threaded design, or a multi-core design A: For the proposal, assume that the most complex RISC-V design will be similar to the Berkeley BOOM RISC-V microprocessor. Q: How many PI meetings and site visits will be held over the course of the SSITH Program? A: There is no set number of such events and each proposal should use their own assumptions for budget purposes.. Q: If we change the RISC-V RTL such that it has a different number of threads (as a result of a generic technique for any processor), how will performance be evaluated, per thread or in the aggregate? A: Performance and the other metrics will be evaluated in aggregate. Q: Will the RISC-V RTL provided as GFE be made artificially weak? If performers provide their own RISC- V RTL, who would be responsible to make sure all RTLs are similarly weakened? A: The unmodified RISC-V RTL and OS will be provided as GFP. Q: For cryptography errors CWE, what are the assumptions about the two ends of encrypted communication? If the two ends are both within the same platform, something could be done to strengthen the weaknesses induced by weak keys and hashes. But if the two ends are two different platforms, what would you expect beyond detection of a weak key/weak hash exception? A: The performer should make required assumptions, and clearly state them in the proposal. Q: Do performers need to address denial of service attacks? A: Yes, SSITH solutions must address denial of service attacks. Please refer to BAA section I-D, page 9. Q: Are the power, performance and area overhead targets in SSITH BAA Table 2 relative to all digital logic on the design, or to the complete SoC? A: Power, performance, area overhead targets in SSITH BAA Table 2 pertain to the complete SoC.

6 Q: Is there a particular view in the CWE database that was used to identify the seven CWE classes of hardware based vulnerabilities discussed in the BAA? Would it be possible to provide examples of each of the seven CWE/CVE vulnerability classes? A: Please refer to the BAA Attachment 3. Q: Do the references to cryptography or crypto-errors in the BAA make any assumptions about the level of cryptography or the method of implementation of the cryptography? A: Please refer to the BAA Attachment 3. Q: For the SSITH program, is there a restriction on foreign nationals performing work in their home countries? Is there a distinction between Tier 1 and Tier 2 countries? Is there a maximum amount of work that can be performed at US universities? A: Please refer to BAA section IV, starting on page 34. Q: Is there a preference or requirement on the minimum budget or size of the team? Will the program planning to select a small number of large teams, or is it open for small teams? A: The total funding amount for the program will be approximately $50M as noted in Part 1, page 4 of the BAA. The budget and size of each team should be appropriate for the proposed technical approach. Q: Is there a preference or requirement for university teams to have an industry partner? A: No. Q: For SSITH, the performers will receive RTL as government furnished equipment. Is it in scope to recode or rework the government furnished RTL into a higher level language? A: Yes. Please refer to BAA section I-D, page 8. Q. Is a multi-core processor (with multiple Rocket cores or multiple BOOM cores) within the scope of the SSITH program? Or is the focus of the SSITH program primarily focused on securing single core processors? A: Yes. SSITH proposals should address securitized versions of a broad range of commercial and DoD applications. Please refer to BAA section I-D, page 8.

7 Q. Can two different teams with non-overlapping PIs/Co-PIs from the same university (or from the same company) submit two completely separate proposals for SSITH TA-1. A: Yes.

8 Third FAQ for SSITH Q: There is a list of evaluation metrics for TA-1 (item 3 in TA-1 Key elements, pg. 8), as well as a table quantifying those metrics (table 2: TA-1 Metrics by Phase, pg. 11). However, there is no discussion in the BAA of evaluation metrics for TA-2. How will TA-2 teams be evaluated by DARPA? A: Refer to the TA-2 evaluation criteria described in SSITH BAA section I-D starting on page 11. Q: Eligibility criterion D.2. ( Ability to Receive Awards in Multiple Technical Areas - Conflicts of Interest (COIs) ) states, While proposers may submit proposals for both Technical Areas 1 and 2, proposers may not be selected for both Technical Area 1 and for Technical Area 2, whether as a prime, subcontractor, or in any other capacity, from an organizational to an individual level. Is any other capacity intended to cover only those situations where a proposer would receive funding, directly or indirectly, through both a TA-1 and a TA-2 proposal, or is it intended more broadly to cover any involvement whatsoever? Here are two specific examples that we need addressed: 1. If a company is a TA-1 subcontractor (receiving funding from DARPA), is it permitted for an individual within that company to play a non-funded advisory role in a TA-2 project? 2. If a company licenses their software to TA-1 contractors, are they also permitted to license their software to TA-2 contractors? A: 1. No 2. Yes Q: Is DARPA going to provide RTL for a given ISA or set of ISAs? Could proposers instead provide their own ISA, provided it is compatible with running the application? A: For evaluation purposes, the government will furnish RTL and FPGA bitstream for 3 different RISC-V processor designs as described in SSITH BAA section II-G, starting on page 14. Q: In order to validate the operation of the existing code on the enhanced box, DARPA must have some test cases with associated test data. When can performers have the test cases and test data with respect to the point at which the testing will take place (by DARPA Hackers)? The difference between an hour, a day, a week, and a month or more could have a significant impact on the results. Will DARPA be providing millions of lines of code? Hundreds of thousands? Less than 1000 SLOCs that are not OS? A: Government Furnished Property/Information will be provided at the beginning of Phase 2 as noted in the SSITH BAA section II-G, starting on page 14. Proposers can also stipulate any proposal assumptions regarding GFP in their proposal.

9 Q: What is the reference power spec for Power Impact = 0%? In Phase 2, the program provides FPGA boards with RTL designs of three sizes of RISC-V processors. Does this imply the reference power spec. is the power requirement for the synthesized version of these three provided RISC-V processors? A: All PPASS metric comparisons will be made with respect to the un-securitized SoC, as noted in the SSITH BAA section II-D, page 9. Q: The program requires software compatibility for existing software. Since the program provides RTL hardware designs to enable a PPA impact assessment, will the program provide any software instances or benchmarks to help quantify software compatibility metrics? A: Refer to the SSITH BAA section II-G, starting on page 14 for a description of Government Furnished Property/Information.

Q: Are power supply attacks in scope for SSITH? A: The hacker team will not have physical access to the power supply.

Q: Are power supply attacks in scope for SSITH? A: The hacker team will not have physical access to the power supply. SSITH FAQ Questions about the Scope of SSITH Q: Is securitization of external memory in the scope for SSITH? Q: Is reverse engineering research of integrated circuits in scope for SSITH? A: No. Please

More information

Configuration Security (ConSec) Proposers Day

Configuration Security (ConSec) Proposers Day Configuration Security (ConSec) Mr. Jacob I. Torrey Proposers Day November 17, 2017 1 ConSec objective statement Develop a system to automatically generate, deploy, and enforce secure configurations of

More information

Photonics in the Package for Extreme Scalability (PIPES) Frequently Asked Questions (FAQ) Document Updated 12/21/2018

Photonics in the Package for Extreme Scalability (PIPES) Frequently Asked Questions (FAQ) Document Updated 12/21/2018 Photonics in the Package for Extreme Scalability (PIPES) Frequently Asked Questions (FAQ) Document Updated 12/21/2018 Q1: The BAA mentions optical fiber a number of times. Is using optical fibers a mandated

More information

DARPA-BAA Hierarchical Identify Verify Exploit (HIVE) Frequently Asked Questions (FAQ) August 18, 2016

DARPA-BAA Hierarchical Identify Verify Exploit (HIVE) Frequently Asked Questions (FAQ) August 18, 2016 DARPA-BAA-16-52 Hierarchical Identify Verify Exploit (HIVE) Frequently Asked Questions (FAQ) August 18, 2016 DARPA-BAA-16-52 Hierarchical Identify Verify Exploit (HIVE) Frequently Asked Questions (FAQ)

More information

A Perspective on the Role of Open-Source IP In Government Electronic Systems

A Perspective on the Role of Open-Source IP In Government Electronic Systems A Perspective on the Role of Open-Source IP In Government Electronic Systems Linton G. Salmon Program Manager DARPA/MTO RISC-V Workshop November 29, 2017 Distribution Statement A (Approved for Public Release,

More information

SECURITY CRYPTOGRAPHY Cryptography Overview Brochure. Cryptography Overview

SECURITY CRYPTOGRAPHY Cryptography Overview Brochure. Cryptography Overview SECURITY CRYPTOGRAPHY Cryptography Overview Brochure Cryptography Overview DPA-resistant and Standard Cryptographic Hardware Cores DPA (Differential Power Analysis) Resistant Hardware Cores prevent against

More information

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 25,

More information

Q48: I noticed an amendment to the ASED BAA, what has changed? Q48: The due date for proposals has been extended from November 9 to November 28.

Q48: I noticed an amendment to the ASED BAA, what has changed? Q48: The due date for proposals has been extended from November 9 to November 28. HR001117S0050 Active Social Engineering Defense (ASED) Frequently Asked Questions As of October 20, 2017 Q50: We would like to know if there is interest in, or if our bid would be considered compliant,

More information

Trustwave Managed Security Testing

Trustwave Managed Security Testing Trustwave Managed Security Testing SOLUTION OVERVIEW Trustwave Managed Security Testing (MST) gives you visibility and insight into vulnerabilities and security weaknesses that need to be addressed to

More information

Ten Reasons to Optimize a Processor

Ten Reasons to Optimize a Processor By Neil Robinson SoC designs today require application-specific logic that meets exacting design requirements, yet is flexible enough to adjust to evolving industry standards. Optimizing your processor

More information

INTRODUCTION TO CLOAKWARE/TRS TECHNOLOGY

INTRODUCTION TO CLOAKWARE/TRS TECHNOLOGY INTRODUCTION TO CLOAKWARE/TRS TECHNOLOGY VERSION 2.2 OCTOBER 2001 SUMMARY Software is easy to tamper with and reverse engineer so unprotected software deployed on malicious hosts can t be trusted by corporations

More information

Towards Post-Quantum Cryptography Standardization. Lily Chen and Dustin Moody National Institute of Standards and Technology USA

Towards Post-Quantum Cryptography Standardization. Lily Chen and Dustin Moody National Institute of Standards and Technology USA Towards Post-Quantum Cryptography Standardization Lily Chen and Dustin Moody National Institute of Standards and Technology USA First mile - Towards PQC standardization After about four years of preparation,

More information

Juniper Vendor Security Requirements

Juniper Vendor Security Requirements Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks

More information

High-Assurance Cyber Space Systems (HACSS) for Small Satellite Mission Integrity

High-Assurance Cyber Space Systems (HACSS) for Small Satellite Mission Integrity Distribution A: SSC17-V-01 High-Assurance Cyber Space Systems (HACSS) for Small Satellite Mission Integrity Daria C. Lane, Enrique S. Leon, Francisco C. Tacliad, Dexter H. Solio, Ian L. Rodney, Dmitriy

More information

SWIFT Customer Security Controls Framework and self-attestation via The KYC Registry Security Attestation Application FAQ

SWIFT Customer Security Controls Framework and self-attestation via The KYC Registry Security Attestation Application FAQ SWIFT Customer Security Controls Framework and self-attestation via The KYC Registry Security Attestation Application FAQ 1 SWIFT Customer Security Controls Framework Why has SWIFT launched new security

More information

CIRT: Requirements and implementation

CIRT: Requirements and implementation CIRT: Requirements and implementation By : Muataz Elsadig Sudan CERT Joint ITU-ATU Workshop on Cyber-security Strategy in African Countries Khartoum, Republic of Sudan, 24 26 July 2016 There is no globally

More information

Combating Cyber Risk in the Supply Chain

Combating Cyber Risk in the Supply Chain SESSION ID: CIN-W10 Combating Cyber Risk in the Supply Chain Ashok Sankar Senior Director Cyber Strategy Raytheon Websense @ashoksankar Introduction The velocity of data breaches is accelerating at an

More information

Security and Privacy in RFID Evolving Application Spaces for Edge Security

Security and Privacy in RFID Evolving Application Spaces for Edge Security 1 Security and Privacy in RFID Evolving Application Spaces for Edge Security Chris Hanebeck, VP Product Management & Marketing Revere Security First, Allow Me to Scare Everyone And It Gets Worse Lockheed

More information

A Supply Chain Attack Framework to Support Department of Defense Supply Chain Security Risk Management

A Supply Chain Attack Framework to Support Department of Defense Supply Chain Security Risk Management A Supply Chain Attack Framework to Support Department of Defense Supply Chain Security Risk Management D r. J o h n F. M i l l e r T h e M I T R E C o r p o r a t i o n P e t e r D. K e r t z n e r T h

More information

ADVANCED ATTACKS AGAINST MOBILE/IOT DEVICES

ADVANCED ATTACKS AGAINST MOBILE/IOT DEVICES CONTEXT- AWARE SECURIT Y THROUGH RAIN RFID ADVANCED ATTACKS AGAINST MOBILE/IOT DEVICES H A R D W A R E S O F T W A R E W I R E L E S S / N E T W O R K S Cold-Boot Attacks Chip-Extraction Side-Channel Attacks

More information

Professional Services Overview

Professional Services Overview Professional Services Overview Internet of Things (IoT) Security Assessment and Advisory Services IOT APPLICATION MOBILE CLOUD NETWORK Company Overview HISTORY HISTORY Founded in 2010 Headquartered in

More information

Security Task Group. Presented by Richard Newell Vice-Chair May 9, th RISC-V Workshop, Barcelona

Security Task Group. Presented by Richard Newell Vice-Chair May 9, th RISC-V Workshop, Barcelona Security Task Group Presented by Richard Newell Vice-Chair May 9, 2018 8 th RISC-V Workshop, Barcelona Security Group Organization Before last week Board of Directors Marketing Technical Standing Committees

More information

Common Criteria. Xerox Advanced Multifunction Systems

Common Criteria. Xerox Advanced Multifunction Systems Xerox Security Common Criteria Evaluation Questions & Answers Xerox and Sharp Xerox Advanced Multifunction Systems WorkCentre M35/M45/M55 WorkCentre Pro 35/45/55/65/75/90 WorkCentre Pro C2128/C2636/C3545

More information

Federal Information Processing Standard (FIPS) What is it? Why should you care?

Federal Information Processing Standard (FIPS) What is it? Why should you care? Federal Information Processing Standard (FIPS) 140-2 What is it? Why should you care? SECURITY IS BECOMING A GROWING CONCERN The migration from TDM to IP communication networks has drastically increased

More information

White Paper. How to Write an MSSP RFP

White Paper. How to Write an MSSP RFP White Paper How to Write an MSSP RFP https://www.solutionary.com (866) 333-2133 Contents 3 Introduction 3 Why a Managed Security Services Provider? 5 Major Items to Consider Before Writing an RFP 5 Current

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation

More information

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements

More information

Procurement Language for Supply Chain Cyber Assurance

Procurement Language for Supply Chain Cyber Assurance Procurement Language for Supply Chain Cyber Assurance Procurement Language for Supply Chain Cyber Assurance Introduction For optimal viewing of this PDF, please view in Adobe Acrobat. This document serves

More information

ITS310: Introduction to Computer Based Systems Credit Hours: 3

ITS310: Introduction to Computer Based Systems Credit Hours: 3 ITS310: Introduction to Computer Based Systems Credit Hours: 3 Contact Hours: This is a 3 credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact

More information

ALIENVAULT USM FOR AWS SOLUTION GUIDE

ALIENVAULT USM FOR AWS SOLUTION GUIDE ALIENVAULT USM FOR AWS SOLUTION GUIDE Summary AlienVault Unified Security Management (USM) for AWS is a unified security platform providing threat detection, incident response, and compliance management

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT Ixia NTO 7303 and Vision ONE v4.5.0.29 30 October 2017 383-4-409 1.0 Government of Canada. This document is the property of the Government of Canada. It shall not be

More information

Cybersecurity in Acquisition

Cybersecurity in Acquisition Kristen J. Baldwin Acting Deputy Assistant Secretary of Defense for Systems Engineering (DASD(SE)) Federal Cybersecurity Summit September 15, 2016 Sep 15, 2016 Page-1 Acquisition program activities must

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Verdasys Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of

More information

Industry Collaboration and Innovation

Industry Collaboration and Innovation Industry Collaboration and Innovation OpenCAPI Topics Industry Background Technology Overview Design Enablement OpenCAPI Consortium Industry Landscape Key changes occurring in our industry Historical microprocessor

More information

Software Development Using Full System Simulation with Freescale QorIQ Communications Processors

Software Development Using Full System Simulation with Freescale QorIQ Communications Processors Patrick Keliher, Simics Field Application Engineer Software Development Using Full System Simulation with Freescale QorIQ Communications Processors 1 2013 Wind River. All Rights Reserved. Agenda Introduction

More information

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting

More information

Cyber Security of ETCS

Cyber Security of ETCS 1 Addressing the challenges Cyber Security of ETCS Simon Tonks 2 Background The UK rail network is currently being upgraded to use new signalling technology (ERTMS) The ROSCOs are delivering the First

More information

Trusted Computing Group

Trusted Computing Group Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing

More information

GDPR Update and ENISA guidelines

GDPR Update and ENISA guidelines GDPR Update and ENISA guidelines 2016 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how to ensure

More information

Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security

Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security Michael John SmartSec 2016, Amsterdam www.encs.eu European Network for Cyber Security The European

More information

The Honest Advantage

The Honest Advantage The Honest Advantage READY TO CHALLENGE THE STATUS QUO GSA Security Policy and PCI Guidelines The GreenStar Alliance 2017 2017 GreenStar Alliance All Rights Reserved Table of Contents Table of Contents

More information

Gujarat Forensic Sciences University

Gujarat Forensic Sciences University Gujarat Forensic Sciences University Knowledge Wisdom Fulfilment Cyber Security Consulting Services Secure Software Engineering Infrastructure Security Digital Forensics SDLC Assurance Review & Threat

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior

More information

Engineering Your Software For Attack

Engineering Your Software For Attack Engineering Your Software For Attack Robert A. Martin Senior Principal Engineer Cyber Security Center Center for National Security The MITRE Corporation 2013 The MITRE Corporation. All rights reserved.

More information

Expansion Options and Fiber Line Extension Policy

Expansion Options and Fiber Line Extension Policy Expansion Options and Fiber Line Extension Policy Nov. 2, 2015 No Action Required Information and Feedback Requested Today s Discussion Public Power Benefit - Fiber Expansion Options Background for determining

More information

EXECUTIVE REPORT ADOBE SYSTEMS, INC. COLDFUSION SECURITY ASSESSMENT

EXECUTIVE REPORT ADOBE SYSTEMS, INC. COLDFUSION SECURITY ASSESSMENT EXECUTIVE REPORT ADOBE SYSTEMS, INC. COLDFUSION SECURITY ASSESSMENT FEBRUARY 18, 2016 This engagement was performed in accordance with the Statement of Work, and the procedures were limited to those described

More information

TRACKVIA SECURITY OVERVIEW

TRACKVIA SECURITY OVERVIEW TRACKVIA SECURITY OVERVIEW TrackVia s customers rely on our service for many mission-critical applications, as well as for applications that have various compliance and regulatory obligations. At all times

More information

ROADMAP TO DFARS COMPLIANCE

ROADMAP TO DFARS COMPLIANCE ROADMAP TO DFARS COMPLIANCE ARE YOU READY FOR THE 12/31/17 DEADLINE? In our ebook, we have answered the most common questions we receive from companies preparing for DFARS compliance. Don t risk terminated

More information

How to Create, Deploy, & Operate Secure IoT Applications

How to Create, Deploy, & Operate Secure IoT Applications How to Create, Deploy, & Operate Secure IoT Applications TELIT WHITEPAPER INTRODUCTION As IoT deployments accelerate, an area of growing concern is security. The likelihood of billions of additional connections

More information

Technical Brief Distributed Trusted Computing

Technical Brief Distributed Trusted Computing Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,

More information

ARM Security Solutions and Numonyx Authenticated Flash

ARM Security Solutions and Numonyx Authenticated Flash ARM Security Solutions and Numonyx Authenticated Flash How to integrate Numonyx Authenticated Flash with ARM TrustZone* for maximum system protection Introduction Through a combination of integrated hardware

More information

Ming Ming Wong Jawad Haj-Yahya Anupam Chattopadhyay

Ming Ming Wong Jawad Haj-Yahya Anupam Chattopadhyay Hardware and Architectural Support for Security and Privacy (HASP 18), June 2, 2018, Los Angeles, CA, USA Ming Ming Wong Jawad Haj-Yahya Anupam Chattopadhyay Computing and Engineering (SCSE) Nanyang Technological

More information

Certification Report

Certification Report Certification Report EAL 3+ Evaluation of Xerox WorkCentre 5632/5638/5645/5655/5665/5675/5687 Multifunction Systems Issued by: Communications Security Establishment Canada Certification Body Canadian Common

More information

Trustzone Security IP for IoT

Trustzone Security IP for IoT Trustzone Security IP for IoT Udi Maor CryptoCell-7xx product manager Systems & Software Group ARM Tech Forum Singapore July 12 th 2017 Why is getting security right for IoT so important? When our everyday

More information

K12 Cybersecurity Roadmap

K12 Cybersecurity Roadmap K12 Cybersecurity Roadmap Introduction Jason Brown, CISSP Chief Information Security Officer Merit Network, Inc jbrown@merit.edu @jasonbrown17 https://linkedin.com/in/jasonbrown17 2 Agenda 3 Why Use the

More information

Elaine Barker and Allen Roginsky NIST June 29, 2010

Elaine Barker and Allen Roginsky NIST June 29, 2010 Elaine Barker and Allen Roginsky NIST June 29, 2010 Background: Cryptography is used to protect sensitive information Attackers are becoming smarter, and computers are becoming more powerful Many commonly

More information

ESE Back End 2.0. D. Gajski, S. Abdi. (with contributions from H. Cho, D. Shin, A. Gerstlauer)

ESE Back End 2.0. D. Gajski, S. Abdi. (with contributions from H. Cho, D. Shin, A. Gerstlauer) ESE Back End 2.0 D. Gajski, S. Abdi (with contributions from H. Cho, D. Shin, A. Gerstlauer) Center for Embedded Computer Systems University of California, Irvine http://www.cecs.uci.edu 1 Technology advantages

More information

Certification Report

Certification Report Certification Report Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security Establishment,

More information

SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017

SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017 SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017 WHAT WE DO What we do Robust and Efficient Cryptographic Protocols Research in Cryptography and

More information

Industrial-Strength High-Performance RISC-V Processors for Energy-Efficient Computing

Industrial-Strength High-Performance RISC-V Processors for Energy-Efficient Computing Industrial-Strength High-Performance RISC-V Processors for Energy-Efficient Computing Dave Ditzel dave@esperanto.ai President and CEO Esperanto Technologies, Inc. 7 th RISC-V Workshop November 28, 2017

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO 21500 Lead Project Manager The objective of the PECB Certified ISO 21500 Lead Project Manager examination is to ensure that the candidate has the knowledge and

More information

Certification Report

Certification Report Certification Report McAfee File and Removable Media Protection 4.3.1 and epolicy Orchestrator 5.1.2 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation

More information

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version to 2.0

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version to 2.0 Payment Card Industry (PCI) Data Security Standard Summary of s from PCI DSS Version 1.2.1 to 2.0 October 2010 General General Throughout Removed specific references to the Glossary as references are generally

More information

A Measurement Companion to the CIS Critical Security Controls (Version 6) October

A Measurement Companion to the CIS Critical Security Controls (Version 6) October A Measurement Companion to the CIS Critical Security Controls (Version 6) October 2015 1 A Measurement Companion to the CIS Critical Security Controls (Version 6) Introduction... 3 Description... 4 CIS

More information

MICROCIRCUIT SECURITY

MICROCIRCUIT SECURITY MICROCIRCUIT SECURITY Everything begins in the chip. Sawblade Ventures, LLC Austin, Texas Chip Security Vulnerability: How to Close the Gap Between Design Software & Design Hardware CTEA Electronics Symposium

More information

Penetration testing.

Penetration testing. Penetration testing Penetration testing is a globally recognized security measure that can help provide assurances that a company s critical business infrastructure is protected from internal or external

More information

Custom Silicon for all

Custom Silicon for all Custom Silicon for all Because Moore s Law only ends once Who is SiFive? Best-in-class team with technology depth and breadth Founders & Execs Key Leaders & Team Yunsup Lee CTO Krste Asanovic Chief Architect

More information

Service Level Agreement (SLA) and Service Level Objectives (SLO)

Service Level Agreement (SLA) and Service Level Objectives (SLO) Service Level Agreement (SLA) and Service Level Objectives (SLO) Ver 1.4 Table of Contents 1. Overview.... 3 2. Definitions.... 3 3. Credit Standards... 3 3.1 Datacenter... 4 3.2 Infrastructure... 4 3.3

More information

Lab #3 Defining the Scope and Structure for an IT

Lab #3 Defining the Scope and Structure for an IT Lab #3 Defining the Scope and Structure for an IT Risk Management Plan Introduction Every company needs to take risks to thrive, but not too much risk which could be catastrophic. Finding the balanced

More information

Course Curriculum for Master Degree in Network Engineering and Security

Course Curriculum for Master Degree in Network Engineering and Security Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science

More information

Medical Device Vulnerability Management

Medical Device Vulnerability Management Medical Device Vulnerability Management MDISS / NH-ISAC Process Draft Dale Nordenberg, MD June 2015 Market-based public health: collaborative acceleration Objectives Define a trusted and repeatable process

More information

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated

More information

Seagate Supply Chain Standards and Operational Systems

Seagate Supply Chain Standards and Operational Systems DATA IS POTENTIAL Seagate Supply Chain Standards and Operational Systems Government Solutions Henry Newman May 9 2018 Supply Chain Standards and Results Agenda 1. 2. SUPPLY CHAIN REQUIREMENTS AND STANDARDS

More information

Pioneer Communications Internet Services Disclosure

Pioneer Communications Internet Services Disclosure Pioneer Communications Internet Services Disclosure Pioneer Communications ( Pioneer ) is the leading Internet service provider for Southwest Kansas communities with a reputation for excellence that goes

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

CONCLUSIONS AND RECOMMENDATIONS

CONCLUSIONS AND RECOMMENDATIONS Chapter 4 CONCLUSIONS AND RECOMMENDATIONS UNDP and the Special Unit have considerable experience in South-South cooperation and are well positioned to play a more active and effective role in supporting

More information

APPENDIX 1: ENTERPRISE SUBSCRIPTION SERVICES

APPENDIX 1: ENTERPRISE SUBSCRIPTION SERVICES APPENDIX 1: ENTERPRISE SUBSCRIPTION SERVICES This Appendix 1, which includes the documents referred to in this Appendix 1 (together, the Appendix ), describes the fee bearing subscriptions that Liferay

More information

Acalvio Deception and the NIST Cybersecurity Framework 1.1

Acalvio Deception and the NIST Cybersecurity Framework 1.1 Acalvio Deception and the NIST Cybersecurity Framework 1.1 June 2018 The Framework enables organizations regardless of size, degree of cybersecurity risk, or cybersecurity sophistication to apply the principles

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT Lexmark CX920, CX921, CX922, CX923, CX924, XC9235, XC9245, XC9255, and XC9265 Multi-Function Printers 7 February 2018 383-4-434 V1.0 Government of Canada. This document

More information

External Supplier Control Obligations. Cyber Security

External Supplier Control Obligations. Cyber Security External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place

More information

Computer Architecture and Engineering. CS152 Quiz #3. March 18th, Professor Krste Asanovic. Name:

Computer Architecture and Engineering. CS152 Quiz #3. March 18th, Professor Krste Asanovic. Name: Computer Architecture and Engineering CS152 Quiz #3 March 18th, 2008 Professor Krste Asanovic Name: Notes: This is a closed book, closed notes exam. 80 Minutes 10 Pages Not all questions are of equal difficulty,

More information

ISO/IEC Common Criteria. Threat Categories

ISO/IEC Common Criteria. Threat Categories ISO/IEC 15408 Common Criteria Threat Categories 2005 Bar Biszick-Lockwood / QualityIT Redmond, WA 2003 Purpose This presentation introduces you to the threat categories contained in ISO/IEC 15408, used

More information

Product Overview Version 1.0. May 2018 Silent Circle Silent Circle. All Rights Reserved

Product Overview Version 1.0. May 2018 Silent Circle Silent Circle. All Rights Reserved Product Overview Version 1.0 May 2018 Silent Circle The Problem Today s world is mobile. Employees use personal and company owned devices smartphones, laptops, tablets to access corporate data. Businesses

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT WorkCentre 7525/7530/7535/7545/7556 with FIPS 140-2 Compliance over SNMPv3 25 July 2016 v1.0 383-4-371 Government of Canada. This document is the property of the Government

More information

The lowrisc project Alex Bradbury

The lowrisc project Alex Bradbury The lowrisc project Alex Bradbury lowrisc C.I.C. 3 rd April 2017 lowrisc We are producing an open source Linux capable System-on-a- Chip (SoC) 64-bit multicore Aim to be the Linux of the Hardware world

More information

Synology Security Whitepaper

Synology Security Whitepaper Synology Security Whitepaper 1 Table of Contents Introduction 3 Security Policy 4 DiskStation Manager Life Cycle Severity Ratings Standards Security Program 10 Product Security Incident Response Team Bounty

More information

Question & Answer #3

Question & Answer #3 DARPA Blackjack Pit Boss Reference: HR001119S0012 Question & Answer #3 Question 53: Please clarify the WBS level the cost volume and Excel file should presented. Page 8 says Phase 1 should be broken down

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of McAfee Enterprise Mobility Management 9.7 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc. Submitted by SPYRUS, Inc. Contents DT5000 and DT6000 Technology Overview...2 Why DT5000 and DT6000 Encryption Is Different...3 Why DT5000 and DT6000 Encryption Is Different - Summary...4 XTS-AES Sector-Based

More information

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES To Secure Azure and Hybrid Cloud Environments Introduction Cloud is at the core of every successful digital transformation initiative. With cloud comes new

More information

REPORT 2015/149 INTERNAL AUDIT DIVISION

REPORT 2015/149 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results

More information

MDA Acquisition Updates

MDA Acquisition Updates MDA Acquisition Updates Laura M. DeSimone Director for Acquisition & Karla Smith Jackson Director of Contracts Missile Defense Agency May 15, 2018 Distribution Statement A:, distribution is unlimited.

More information

Evaluation. Common Criteria. Questions & Answers. Xerox Advanced Multifunction Systems. WorkCentre M35/M45/M55 WorkCentre Pro 35/45/55

Evaluation. Common Criteria. Questions & Answers. Xerox Advanced Multifunction Systems. WorkCentre M35/M45/M55 WorkCentre Pro 35/45/55 Xerox Security Common Criteria Evaluation Questions & Answers Xerox Advanced Multifunction Systems WorkCentre M35/M45/M55 WorkCentre Pro 35/45/55 Written by: Larry Kovnat and Betty Ingerson Prepared by:

More information

The Center for Internet Security

The Center for Internet Security The Center for Internet Security The CIS Security Metrics Service July 1 2008 Organizations struggle to make cost-effective security investment decisions; information security professionals lack widely

More information

RISC-V as a basis for ASIP design A Quantum-Resistant IoT Security Implementation

RISC-V as a basis for ASIP design A Quantum-Resistant IoT Security Implementation RISC-V as a basis for ASIP design A Quantum-Resistant IoT Security Implementation Agenda Introductions RISC-V and ASIPs Implementation of Security Methods Performance results Codasip and SecureRF ASIP

More information

Teradata and Protegrity High-Value Protection for High-Value Data

Teradata and Protegrity High-Value Protection for High-Value Data Teradata and Protegrity High-Value Protection for High-Value Data 12.16 EB7178 DATA SECURITY Table of Contents 2 Data Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:

More information

Your Data and Artificial Intelligence: Wise Athena Security, Privacy and Trust. Wise Athena Security Team

Your Data and Artificial Intelligence: Wise Athena Security, Privacy and Trust. Wise Athena Security Team Your Data and Artificial Intelligence: Wise Athena Security, Privacy and Trust Wise Athena Security Team Contents Abstract... 3 Security, privacy and trust... 3 Artificial Intelligence in the cloud and

More information

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : ISACA CISA ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : http://killexams.com/pass4sure/exam-detail/cisa QUESTION: 390 Applying a digital signature to data traveling in a

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT McAfee Policy Auditor 6.4 with epolicy Orchestrator 5.10 5 November 2018 383-4-455 V1.0 Government of Canada. This document is the property of the Government of Canada.

More information

People risk. Capital risk. Technology risk

People risk. Capital risk. Technology risk Decode secure. People risk Capital risk Technology risk Cybersecurity needs a new battle plan. A better plan that deals with the full spectrum of your company s cybersecurity not just your technology.

More information