Dr. Dan Stanzione, Associate Vice President for Research at The University of Texas at Austin since 2018 and Executive Director of the Texas Advanced Computing Center (TACC) since 2014, is a nationally recognized leader in high performance computing. He is the principal investigator (PI) for a National Science Foundation (NSF) grant to deploy Frontera, which is the fastest supercomputer at any U.S. university. Stanzione is also the PI of TACC's Stampede2 and Wrangler systems, supercomputers for high performance computing and for data-focused applications, respectively. For six years he was co-PI of CyVerse, a large-scale NSF life sciences cyberinfrastructure. Stanzione was also a co-PI for TACC's Ranger and Lonestar supercomputers, large-scale NSF systems previously deployed at UT Austin. Stanzione received his bachelor's degree in electrical engineering and his master's degree and doctorate in computer engineering from Clemson University.
Integrated Circuit (IC) designers use third-party intellectual
property (IP) cores in their designs. Further, they outsource
the various steps in the IC design, manufacturing, testing and
packaging flow. Such a globally distributed electronics supply
chain is introducing security vulnerabilities in the ICs and the
systems that use them. This is forcing IC designers and end-users
to re-evaluate their trust in ICs. If an attacker gets hold of an
unprotected IC, he can reverse engineer the IC and pirate the IP.
Similarly, she can insert malicious circuits and backdoors into the IC.
In this talk I will outline High-Level Design for Trust techniques
to prevent these and similar attacks: Locking/Obfuscation/Redaction
and Secure Sourcing of IPs for High-Level Integration. Locking/Obfuscation
implements a built-in obfuscation mechanism in ICs to prevent reverse
engineering. Secure sourcing can thwart Trojan insertion in 3rd party
Intellectual Properties. I will wrap up the presentation by pointing
out why hardware security is an essential objective from economics,
security, and safety aspects and offer my vision of the developing
field of hardware cybersecurity.
Edge applications for autonomous systems require high performance
computation and augmented dependability. Silicon integrity is a
key asset in this context and combined with system level
ingredients it enables efficient HW/SW safety architectures.
This talk will present the safety architecture technologies and discuss the silicon integrity capabilities and features.
Challenges and future main research directions will be presented.