EMail Print

Events

Microsemi Security Forum 2015 on 10.01.2015 - 10.01.2015 08.30 h - 05.40 h at Hilton Baltimore BWI Airport Hotel

Description

Overview

Register for Microsemi Security Forum - October 1, 2015

Hilton Baltimore BWI Airport Hotel
Thursday, October 1, 2015 – 8:30 a.m. – 5:40 p.m.
 

You are cordially invited to attend the Microsemi Security Forum that will be held on Thursday, Oct 1, 2015, at Hilton Baltimore BWI Airport Hotel.

In this one-day highly-informative and targeted security technology conference, Microsemi security experts will provide an in-depth overview of the company's latest and most innovative information assurance and anti-tamper products, technologies, and solutions. These include the company's most advanced secure FPGAs and SoC FPGAs, Data-at-Rest products including TRRUST-Stor™ Solid State Drive (SSD), as well as Microsemi security services and Intellectual Property. The technical, non-classified Microsemi Security Forum will feature technical product presentations and demonstrations, industry expert keynote presentations, several opportunities for interactive Q&A sessions, and provide an outstanding opportunity to network with others in the related fields. Continental breakfast and lunch will be served with advanced reservations.

Date: Thursday, October 1, 2015
Time: 8:30 a.m. to 5:40 p.m. (Registration opens at 8:00 a.m.)
Where: Hilton Baltimore BWI Airport Hotel
1739 W Nursery Rd, Linthicum Heights, MD 21090 BWI Hilton Hotel
Phone: (410) 694-0808

Space is limited so please register now at Security Forum Registration website: http://www.microsemi.com/microsemi-security-forum

For questions, please contact: SecurityForum@Microsemi.com.

Microsemi is a leading provider of information assurance (IA) and anti-tamper (AT) solutions and services to U.S. federal organizations, systems integrators, and industries requiring a high-level of electronic security including financial, digital rights management, gaming, industrial automation, and medical. The company leverages its proven hardware and software IA/AT technologies and extensive industry experience to fortify critical program information and technology through the entire system lifecycle. In addition, Microsemi provides comprehensive IA/AT services such as risk assessments, protection development, and red teaming to satisfy security requirements. For more information on Microsemi, please visit www.Microsemi.com.

Agenda

Time

Topic

Presenter

8:00 – 8:30 Breakfast and Registration  
8:30 – 8:45 Welcome and Agenda Overview {popup href="#john" rel="{size:{x:400,y:400}}"}John Costello{/popup}
8:45 – 9:30 NSA Special Keynote  
9:30 – 10:30 FPGA Security & Partner Demonstration {popup href="#richard" rel="{size:{x:400,y:400}}"}Richard Newell{/popup}
10:30 – 11:15 Microsemi FPGA Update {popup href="#ted" rel="{size:{x:400,y:400}}"}Ted Speers{/popup}
11:15 – 11:30 Break Private Meetings (upon request)
11:30 – 11:50 DPA Countermeasures for SRAM FPGA's {popup href="#kenneth" rel="{size:{x:400,y:400}}"}Kenneth Alexander{/popup}
11:50 – 12:30 Threat Driven Security Design Approach {popup href="#jim" rel="{size:{x:400,y:400}}"}James Gallagher{/popup}
12:30 - 1:15 Lunch and Special Keynote Speaker Anti-Tamper Executive Agent (ATEA)
1:30 - 2:00 Serial Data Bus vulnerability practicum {popup href="#brian" rel="{size:{x:400,y:400}}"}Brian Sutton{/popup}
2:00 - 2:45 MACSec Encryption {popup href="#uday" rel="{size:{x:400,y:400}}"}Uday Mudoi{/popup}
2:45 – 3:30 Secure Modules & Storage solutions {popup href="#iain" rel="{size:{x:400,y:400}}"}Iain Mackie{/popup}
3:30 – 4:15 System In Package Solutions for security {popup href="#iain" rel="{size:{x:400,y:400}}"}Iain Mackie{/popup}
4:15 – 4:30 Break Private Meetings(upon request)
4:30 - 5:30 Securing GPS in GPS Denied Environments {popup href="#jeremy" rel="{size:{x:400,y:400}}"}Jeremy Warriner{/popup}
5:30 – 5:40  Concluding Remarks / Q&A {popup href="#paul" rel="{size:{x:400,y:400}}"}Paul Quintana{/popup}
5:45 – 7:00 Reception Private Meetings (upon request)

John Costello

Corporate Vice President of Business Development & Government Relations for Security and Defense

John Costello is the corporate vice president of business development and Government Relations, Security & Defense. John has 30 years of experience in the high reliability world and leads Microsemi's security and defense teams. His responsibilities include development of global market strategies and government relations. Prior to taking the vice president of Business Development role, John served as vice president of High Reliability Worldwide Sales from 2004 to 2011. Under his leadership roles in global sales, Microsemi achieved substantial growth and met all corporate sales objectives.

Richard Newell

Senior Principal Product Architect

Richard Newell serves as senior principal product architect at Microsemi and plays a key role in planning the security features for the current and future generations of flash-based FPGAs and SoC FPGAs. Richard has an electrical engineering background with experience in analog and digital signal processing, cryptography, control systems, inertial sensors and systems, and FPGAs. He is an alumnus of the University of Iowa. Richard is the recipient of approximately one dozen U.S. patents, and is a member of the Tau Beta Pi and Eta Kappa Nu honorary engineering societies.

Paul Quintana

Director of Defense, Security and Computing Vertical Marketing

Paul Quintana works for Microsemi as the director of Defense, Security and Computing Vertical Marketing focusing on secure communications, cryptography, RADAR/EW and computing. Prior to joining Microsemi, Paul spent more than four years at Altera Corporation as a senior strategic marketing manager focusing on intelligence, cyber security, cryptography and high-performance computing markets. He also spent 12 years at Lockheed Martin as a senior staff engineer in multiple capacities, including principal investigator for internal research and development of advanced computing architectures and as chief engineer for signals intelligence programs. Paul holds MSEE and BSEE degrees from New Mexico State University.

Ted Speers

Microsemi Fellow

Ted Speers is a Microsemi FPGA and SoC Fellow and has been with the FPGA Group for 26 years. Since 2002, he has headed Product Planning, responsible for defining our FPGAs. Having recognized its importance and value early on, security innovation and leadership has been a constant in our FPGA roadmap under Ted's direction. Ted is a graduate of Cornell University and recipient of approximately 30 U.S. patents.

Brian M. Sutton

Embedded Systems Engineering Lead

Mr. Sutton received a B.S. in Electrical and Computer Engineering from Purdue University in 2006. While at Purdue, he worked cooperatively with Advanced Micro Devices and was later employed for work on the Barcelona processor as a Product Development Engineer. During his time at AMD, he worked on scan based testing and high-speed IO characterization, debug, and failure analysis. In 2013 he earned his M.S. in Electrical and Computer Engineering from Purdue and is currently pursuing his Ph.D. in Microelectronics and Nanotechnology with a specialization in spintronics and quantum computing. Since joining Microsemi Security Solutions he has worked on a broad range of anti-tamper technologies, system protection design, whitebox cryptography, and currently serves as the Embedded Systems Engineering Lead.

Jim Gallagher

Vice President of Engineering (Security Solutions)

Jim joined Microsemi as Vice President of Engineering for Security Solutions in August 2009. Jim leads the development of software and firmware products and services to prevent reverse engineering and product tampering. Jim has 25 years of experience in real-time embedded software and system development, with a strong focus on software process implementation. Prior to joining Microsemi, Jim began his career with General Motors holding numerous software and systems assignments. Jim holds a Bachelor of Science degree in Electrical Engineering from the University of Notre Dame and a Master of Software Engineering degree from Carnegie Mellon University.

Iain Mackie

Vice President of Engineering (Memory and Storage)

Iain joined Microsemi in October 2011 as Vice President of engineering for Memory and Storage products and responsible for development and manufacturing engineering of the Memory and Storage products including the Microsemi's custom System in Package (SiP) capability. Previously Iain has held individual contributor, manager and executive roles with Unisys Corporation, Advanced Hardware Architectures, Sharp Corporation and Lightfleet Corporation. Iain has a B.Sc. with Honors in Electronics and Electrical Engineering with Computer Science from the University of Glasgow.

Jeremy Warriner

Director of Government Systems (Frequency & Time Division)

Jeremy Warriner graduated from the University of Nebraska with a BS in Electrical Engineering and is currently the Director of the Government Systems business area in the Frequency and Time Division of Microsemi. He has spent the past 15 years designing and deploying resilient GPS-based systems.

Uday Mudoi

Vice President, Product Marketing for Ethernet Networking Technologies

Uday Mudoi, vice president, Product Marketing for Ethernet Networking Technologies (ENT) BU at Microsemi Corporation, has nearly two decades of experience in the communications and semiconductor industries. Mr. Mudoi holds a Bachelor of Science degree in electrical engineering from the Indian Institute of Technology, Kharagpur, a master's degree in computer science from North Carolina State University, Raleigh, and an MBA from Columbia University, New York, N.Y.

Kenneth S. Alexander

Embedded Systems Engineer

Mr. Alexander received a B.S. in Electrical and Computer Engineering from Rose-Hulman Institute of Technology in 2008. He joined Microsemi Security Solutions in 2008 designing, developing, and testing cryptographic and security IP for FPGAs and embedded software where he contributed materially to the development of the EnforcIT product portfolio. He has worked on a variety of Microsemi security technologies, industrial and defense system protection evaluation, implementation, and integration, as an EnforcIT project lead, and currently serves as an Embedded Systems Engineer.

Kenneth S. Alexander

Embedded Systems Engineer

Mr. Alexander received a B.S. in Electrical and Computer Engineering from Rose-Hulman Institute of Technology in 2008. He joined Microsemi Security Solutions in 2008 designing, developing, and testing cryptographic and security IP for FPGAs and embedded software where he contributed materially to the development of the EnforcIT product portfolio. He has worked on a variety of Microsemi security technologies, industrial and defense system protection evaluation, implementation, and integration, as an EnforcIT project lead, and currently serves as an Embedded Systems Engineer.

William Klingensmith

William N Klingensmith has 29 years' of experience as a security design engineer, system security engineer, program manager and technical director. He holds a BS in Electrical Engineering from Penn State University, and a BS in physics from Edinboro University (of Pennsylvania). William Klingensmith is a veteran on NSA IAD serving a Program Manager and Technical Director for over 15 years. Mr. Klingensmith has been instrumental in the development and execution of IAD direction including the new Security Implementation Guidelines (SIG) document. Mr. Klingensmith has worked with all leading FPGA companies on the development of FPGA security and their use in cryptographic systems.

Abstracts

DPA Countermeasures for the configuration of SRAM FPGAs
This presentation will explain a practical way to mitigate Side Channel Analysis vulnerabilities inherent in the bitstream decryption engines in SRAM FPGAs. The method uses SmartFusion®2 flash based FPGAs as the secure root-of-trust. A multi-staged approach is used, where the SmartFusion2 host establishes a secure boot loader in the target FPGA. The host and boot loader establish a secret key pair to securely transmit the long term application keys used to decrypt the final bitstream to be loaded into the device. All cryptographic algorithms have DPA countermeasures in place. This work further presents data on the effectiveness of the underlying solution using a statistical characterization of side channel leakage using the Test Vector Leakage Assessment (TVLA) methodology proposed by Cryptography Research, Inc. (CRI).
FPGA Security & Partner Demonstration
Richard will present several recent and imminent developments related to FPGA security. First will be presentation of the recent certification of SmartFusion®2 SoC FPGAs and IGLOO®2 FPGAs by an independent third-party lab with respect to the DPA resistance of their design security protocols. Then some hot-off-the-press DPA test results from partner The Athena Group’s TeraFire® cryptographic core will be presented. Third, Microsemi partner SecureRF will demonstrate their fast, very low-energy Group Theoretic Cryptography (GTC) public key scheme called the AlgebraicEraser™ algorithm on a SmartFusion®2 dev. kit. Fourth, the imminent availability of a complete integrated key management solution for Microsemi FPGAs using FIPS140 certified hardware security modules will be presented.
Threat Driven Security Design Approach
Threat-driven security is a systematic system-level approach that is driven by a clear understanding of the security need – it is not arbitrary application of security technologies based on their perceived effectiveness or hype. Using this systematic approach, the strength of a protection is easily gauged through simple identification of the weakest link in the design.  This presentation will review our approach to identifying security vulnerabilities, determining viable mitigations, and developing a threat tree that leads to a robust threat-driven protection.
Serial data bus vulnerability practicum 
Communication busses are an obvious necessary component of modern systems.  These busses, however, also provide a ready attack surface for determined adversaries. This topic will focus on vulnerabilities that exist in the CAN bus, which is used on numerous applications. After explaining why the vulnerabilities exist and how they are identified from a practical perspective, various solutions will be discussed.  While a CAN bus is used in this example, the methods used and types of vulnerabilities identified are relevant to many serial communication busses.
MACSec Encryption
As the number of network connections increases, so does the network's vulnerabilities. Because hackers can target anything with an IP address, these security risks rise even more when devices are networked without being secured physically. This talk will focus on how networking equipment can take advantage of strong encryption to ensure the necessary data confidentiality needed in Ethernet networks.
The good news is that Ethernet has its own security protocol: namely, IEEE 802.1AE MACsec, along with KeySec (now part of 802.1X) for key management. Specifically designed to secure Ethernet networks, MACsec offers a scalable, highly efficient means to secure network links directly at Layer 2. Apart from being less expensive and lower power compared to IPsec, Microsemi's MACsec implementation (Intellisec™) expands the standard capabilities by facilitating both link-by-link encryption and encryption at the edge of the networks, enabling end-to-end security. Intellisec also supports multiple, individually encrypted, connections out of a single WAN-facing port to a multitude of other end points and (cloud) services, purely based on a PHY implementation.
Secure Modules & Storage Solutions
Microsemi already provides industry leading security in the Trrust-Stor product line Secure Solid State Drives. In this year's Security Forum Microsemi will announce a new product line that takes the Security in Secure Solid State Drives to a whole new level. Key management, tamper protection and authentication are among the provisions that will be discussed.
Traditional DIMMs leave your system's memory solution open to many different kinds of attacks; large memory banks formed from commercially packaged die are better, but still contain vulnerabilities. Microsemi's memory modules increase the sophistication level of required of any would be attacker.
System in Package Solutions for Security
Working with Microsemi to design a custom SiP (System in Package) as part of your product gives you an immediate level of security through obscurity, but what other features can be designed in to protect your critical technology in the field?
Securing GPS in PGS Denied Environments
GPS based systems are used worldwide for both commercial and government applications.  Their widespread adoption, coupled with the relatively high vulnerability of the GPS signal, has created a significant threat to GPS-based systems with a high likelihood of occurrence.  This presentation will focus on applicable technologies and best practices for designing GPS-based systems that are resilient to GPS attacks.