Skip to main content

A FPGA-Based Scheme for Protecting Weapon System Software Technology

  • Conference paper
  • First Online:
  • 2167 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10964))

Abstract

Recently the Korean government has established a law to protect the defense industrial technology for the sake of national security and is trying to apply the anti-tamper methodology to weapon systems acquisition programs. The anti-tamper refers to the system engineering activity to protect critical information in systems from tampering and reverse engineering. Adversary’s malicious tampering can weaken our military advantage, shorten the expected combat life of our system, and erode our defense industrial technological competitiveness. In this paper, we introduce the overview of the anti-tampering techniques and suggest a software protection technique using FPGA which can be efficiently used for weapon systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. US DoD Memorandum: Implementation of Anti-tamper (AT) Techniques in Acquisition Programs (1999)

    Google Scholar 

  2. Huber, I.I., Arthur, F., Scott, J.M.: The role and nature of anti-tamper techniques in U.S. defense acquisition (1999)

    Google Scholar 

  3. US USD (A&T) Memorandum: Guidelines for Implementation of Anti-tamper Techniques in Weapon System Acquisition Programs (2000)

    Google Scholar 

  4. US USD (A&T) Memorandum: Implementing Anti-Tamper (2001)

    Google Scholar 

  5. Pong, C.: FPGA Prototyping by VHDL Examples: Xilinx Microblaze MCS SoC, 2nd edn. Wiley, Hoboken (2017)

    Google Scholar 

  6. Underwood, K.: FPGAs vs. CPUs: trends in peak floating-point performance. In: 12th ACM International Symposium on Field-Programmable Gate Arrays (FPGA 2004), pp. 171–180. ACM Press (2004)

    Google Scholar 

  7. US General Accounting Office Report GAO-04-302: Defense acquisitions: DoD needs to better support program manager’s implementation of anti-tamper protection (2004)

    Google Scholar 

  8. Abaco Systems White Paper: Anti-tamper technology: safeguarding today’s COTS platforms (2016)

    Google Scholar 

  9. US DoD Directive 5000.01: The Defense Acquisition System (2003)

    Google Scholar 

  10. US DoD Instruction 5000.02: Operation of the Defense Acquisition System (2015)

    Google Scholar 

  11. US DoD Instruction 5200.39: Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation (RDT&E) (2015)

    Google Scholar 

  12. US DoD Directive 5200.47E: Anti-Tamper (2015)

    Google Scholar 

  13. US DoD DASD: Program protection plan outline & guidance, Version 1.0 (2011)

    Google Scholar 

  14. Raymond, S.: Identification and protection of critical program information (CPI). In: 18th Annual NDIA Systems Engineering Conference (2016)

    Google Scholar 

  15. Impulse C Homepage. http://www.Impulsec.com

  16. Mitrion-C Homepage. http://www.mitrionics.com

  17. CARTE Homepage. http://www.src-labs.com

  18. Handel-C Homepage. http://www.mentor.com

  19. Justin, T., Maya, G., Kristopher, P.: Trident: from high-level language to hardware circuitry. IEEE Comput. 40(3), 28–37 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yeonseung Ryu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jang, M., Ryu, Y., Park, H. (2018). A FPGA-Based Scheme for Protecting Weapon System Software Technology. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2018. ICCSA 2018. Lecture Notes in Computer Science(), vol 10964. Springer, Cham. https://doi.org/10.1007/978-3-319-95174-4_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-95174-4_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-95173-7

  • Online ISBN: 978-3-319-95174-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics