SBIR-STTR Award

EM Emanation Reduction Technique for FPGAs
Award last edited on: 3/6/2015

Sponsored Program
SBIR
Awarding Agency
DOD : MDA
Total Award Amount
$1,149,432
Award Phase
2
Solicitation Topic Code
MDA10-017
Principal Investigator
Michael Leary

Company Information

Space Photonics Inc

700 Research Center Boulevard
Fayetteville, AR 72701
   (479) 856-6358
   contact@spacephotonics.com
   www.spacephotonics.com
Location: Single
Congr. District: 03
County: Washingto

Phase I

Contract Number: ----------
Start Date: ----    Completed: ----
Phase I year
2011
Phase I Amount
$149,870
Electromagnetic emanations represent a significant potential vector of attack for FPGA designs carrying critical program information or other sensitive data or algorithms. The effort proposed here will implement and study a technique designed to dramatically limit the EM emanations from FPGAs, via a methodology that will not functionally alter target designs, and naturally lends itself to seamless integration with other anti-reverse engineering techniques, allowing for strong, multifaceted protection of critical data. The proposed technique accomplishes EM emanation reduction by using a special layout and routing methodology, for designs on standard COTS FPGAs, that nullifies EM emanations.

Keywords:
Anti-Reverse Engineering, Electromagnetic Emanation Reduction, Fpga

Phase II

Contract Number: ----------
Start Date: ----    Completed: ----
Phase II year
2012
Phase II Amount
$999,562
This effort seeks to build upon our successful Phase I effort to utilize, refine, and perform detailed testing on designs utilizing our EM Emanation Reduction (EMER) technique for FPGAs. The EMER technique is designed to reduce the feasibility of side-channel attacks aimed at gaining critical program information in FPGAs used in BMDS assets, by making it substantially more difficult for an exploiter to reveal protected information via EM emanations from the FPGA. Due to the growing popularity of FPGAs and to the sensitive information programmed into them, it is important to find ways to safeguard the designs programmed into them from reverse engineering. Optimally, several layers of protection would be employed, so that even if an exploiter successfully penetrated one or more levels of protection, they would still find that the design was protected. The goal of this effort is to dramatically reduce the EM emanations from the FPGA, hiding the design from reverse engineering exploits using EM emanations. This technique has no external hardware requirements, making it suitable for co-integration with a variety of other AT/anti-reverse engineering approaches to thoroughly protect an FPGA.

Keywords:
Anti-Tamper, Anti-Reverse Engineering, Fpga, Em Side-Channel