You are cordially invited to attend the Microsemi Security Forum that will be held on Thursday, Oct 1, 2015, at Hilton Baltimore BWI Airport Hotel.
In this one-day highly-informative and targeted security technology conference, Microsemi security experts will provide an in-depth overview of the company's latest and most innovative information assurance and anti-tamper products, technologies, and solutions. These include the company's most advanced secure FPGAs and SoC FPGAs, Data-at-Rest products including TRRUST-Stor™ Solid State Drive (SSD), as well as Microsemi security services and Intellectual Property. The technical, non-classified Microsemi Security Forum will feature technical product presentations and demonstrations, industry expert keynote presentations, several opportunities for interactive Q&A sessions, and provide an outstanding opportunity to network with others in the related fields. Continental breakfast and lunch will be served with advanced reservations.
Date: | Thursday, October 1, 2015 |
Time: | 8:30 a.m. to 5:40 p.m. (Registration opens at 8:00 a.m.) |
Where: | Hilton Baltimore BWI Airport Hotel 1739 W Nursery Rd, Linthicum Heights, MD 21090 BWI Hilton Hotel Phone: (410) 694-0808 |
Space is limited so please register now at Security Forum Registration website: http://www.microsemi.com/microsemi-security-forum
For questions, please contact: SecurityForum@Microsemi.com.
Microsemi is a leading provider of information assurance (IA) and anti-tamper (AT) solutions and services to U.S. federal organizations, systems integrators, and industries requiring a high-level of electronic security including financial, digital rights management, gaming, industrial automation, and medical. The company leverages its proven hardware and software IA/AT technologies and extensive industry experience to fortify critical program information and technology through the entire system lifecycle. In addition, Microsemi provides comprehensive IA/AT services such as risk assessments, protection development, and red teaming to satisfy security requirements. For more information on Microsemi, please visit www.Microsemi.com.
Time |
Topic |
Presenter |
8:00 – 8:30 | Breakfast and Registration | |
8:30 – 8:45 | Welcome and Agenda Overview | {popup href="#john" rel="{size:{x:400,y:400}}"}John Costello{/popup} |
8:45 – 9:30 | NSA Special Keynote | |
9:30 – 10:30 | FPGA Security & Partner Demonstration | {popup href="#richard" rel="{size:{x:400,y:400}}"}Richard Newell{/popup} |
10:30 – 11:15 | Microsemi FPGA Update | {popup href="#ted" rel="{size:{x:400,y:400}}"}Ted Speers{/popup} |
11:15 – 11:30 | Break | Private Meetings (upon request) |
11:30 – 11:50 | DPA Countermeasures for SRAM FPGA's | {popup href="#kenneth" rel="{size:{x:400,y:400}}"}Kenneth Alexander{/popup} |
11:50 – 12:30 | Threat Driven Security Design Approach | {popup href="#jim" rel="{size:{x:400,y:400}}"}James Gallagher{/popup} |
12:30 - 1:15 | Lunch and Special Keynote Speaker | Anti-Tamper Executive Agent (ATEA) |
1:30 - 2:00 | Serial Data Bus vulnerability practicum | {popup href="#brian" rel="{size:{x:400,y:400}}"}Brian Sutton{/popup} |
2:00 - 2:45 | MACSec Encryption | {popup href="#uday" rel="{size:{x:400,y:400}}"}Uday Mudoi{/popup} |
2:45 – 3:30 | Secure Modules & Storage solutions | {popup href="#iain" rel="{size:{x:400,y:400}}"}Iain Mackie{/popup} |
3:30 – 4:15 | System In Package Solutions for security | {popup href="#iain" rel="{size:{x:400,y:400}}"}Iain Mackie{/popup} |
4:15 – 4:30 | Break | Private Meetings(upon request) |
4:30 - 5:30 | Securing GPS in GPS Denied Environments | {popup href="#jeremy" rel="{size:{x:400,y:400}}"}Jeremy Warriner{/popup} |
5:30 – 5:40 | Concluding Remarks / Q&A | {popup href="#paul" rel="{size:{x:400,y:400}}"}Paul Quintana{/popup} |
5:45 – 7:00 | Reception | Private Meetings (upon request) |
DPA Countermeasures for the configuration of SRAM FPGAs This presentation will explain a practical way to mitigate Side Channel Analysis vulnerabilities inherent in the bitstream decryption engines in SRAM FPGAs. The method uses SmartFusion®2 flash based FPGAs as the secure root-of-trust. A multi-staged approach is used, where the SmartFusion2 host establishes a secure boot loader in the target FPGA. The host and boot loader establish a secret key pair to securely transmit the long term application keys used to decrypt the final bitstream to be loaded into the device. All cryptographic algorithms have DPA countermeasures in place. This work further presents data on the effectiveness of the underlying solution using a statistical characterization of side channel leakage using the Test Vector Leakage Assessment (TVLA) methodology proposed by Cryptography Research, Inc. (CRI). |
FPGA Security & Partner Demonstration Richard will present several recent and imminent developments related to FPGA security. First will be presentation of the recent certification of SmartFusion®2 SoC FPGAs and IGLOO®2 FPGAs by an independent third-party lab with respect to the DPA resistance of their design security protocols. Then some hot-off-the-press DPA test results from partner The Athena Group’s TeraFire® cryptographic core will be presented. Third, Microsemi partner SecureRF will demonstrate their fast, very low-energy Group Theoretic Cryptography (GTC) public key scheme called the AlgebraicEraser™ algorithm on a SmartFusion®2 dev. kit. Fourth, the imminent availability of a complete integrated key management solution for Microsemi FPGAs using FIPS140 certified hardware security modules will be presented. |
Threat Driven Security Design Approach Threat-driven security is a systematic system-level approach that is driven by a clear understanding of the security need – it is not arbitrary application of security technologies based on their perceived effectiveness or hype. Using this systematic approach, the strength of a protection is easily gauged through simple identification of the weakest link in the design. This presentation will review our approach to identifying security vulnerabilities, determining viable mitigations, and developing a threat tree that leads to a robust threat-driven protection. |
Serial data bus vulnerability practicum Communication busses are an obvious necessary component of modern systems. These busses, however, also provide a ready attack surface for determined adversaries. This topic will focus on vulnerabilities that exist in the CAN bus, which is used on numerous applications. After explaining why the vulnerabilities exist and how they are identified from a practical perspective, various solutions will be discussed. While a CAN bus is used in this example, the methods used and types of vulnerabilities identified are relevant to many serial communication busses. |
MACSec Encryption As the number of network connections increases, so does the network's vulnerabilities. Because hackers can target anything with an IP address, these security risks rise even more when devices are networked without being secured physically. This talk will focus on how networking equipment can take advantage of strong encryption to ensure the necessary data confidentiality needed in Ethernet networks. The good news is that Ethernet has its own security protocol: namely, IEEE 802.1AE MACsec, along with KeySec (now part of 802.1X) for key management. Specifically designed to secure Ethernet networks, MACsec offers a scalable, highly efficient means to secure network links directly at Layer 2. Apart from being less expensive and lower power compared to IPsec, Microsemi's MACsec implementation (Intellisec™) expands the standard capabilities by facilitating both link-by-link encryption and encryption at the edge of the networks, enabling end-to-end security. Intellisec also supports multiple, individually encrypted, connections out of a single WAN-facing port to a multitude of other end points and (cloud) services, purely based on a PHY implementation. |
Secure Modules & Storage Solutions Microsemi already provides industry leading security in the Trrust-Stor product line Secure Solid State Drives. In this year's Security Forum Microsemi will announce a new product line that takes the Security in Secure Solid State Drives to a whole new level. Key management, tamper protection and authentication are among the provisions that will be discussed. Traditional DIMMs leave your system's memory solution open to many different kinds of attacks; large memory banks formed from commercially packaged die are better, but still contain vulnerabilities. Microsemi's memory modules increase the sophistication level of required of any would be attacker. |
System in Package Solutions for Security Working with Microsemi to design a custom SiP (System in Package) as part of your product gives you an immediate level of security through obscurity, but what other features can be designed in to protect your critical technology in the field? |
Securing GPS in PGS Denied Environments GPS based systems are used worldwide for both commercial and government applications. Their widespread adoption, coupled with the relatively high vulnerability of the GPS signal, has created a significant threat to GPS-based systems with a high likelihood of occurrence. This presentation will focus on applicable technologies and best practices for designing GPS-based systems that are resilient to GPS attacks. |