Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where David Whelihan is active.

Publication


Featured researches published by David Whelihan.


ieee high performance extreme computing conference | 2015

Secure architecture for embedded systems

Michael Vai; Ben Nahill; Joshua Kramer; M. W. Geis; Daniil M. Utin; David Whelihan; Roger I. Khazan

Devices connected to the internet are increasingly the targets of deliberate and sophisticated attacks [1]. Embedded system engineers tend to focus on well-defined functional capabilities rather than “obscure” security and resilience. However, “after-the-fact” system hardening could be prohibitively expensive or even impossible. The co-design of security and resilience with functionality has to overcome a major challenge; rarely can the security and resilience requirements be accurately identified when the design begins. This paper describes an embedded system architecture that decouples secure and functional design aspects.


ieee high performance extreme computing conference | 2016

Systems design of cybersecurity in embedded systems

Michael Vai; David Whelihan; N. Evancich; K. J. Kwak; J. Li; M. Britton; J. Foley; M. Lynch; D. Schafer; J. DeMatteis

Mission critical embedded systems should be capable of performing intended functions with resiliency against cyberattacks. The methodology of design-for-cybersecurity is now widely recognized, in which the effects of cybersecurity, or lack thereof, on system objectives must be determined. However, developers are often challenged by the difficulty of analyzing a system-under-design without complete specifics. In this paper, we describe a systems design approach, which incrementally models the cybersecurity architecture, components, and interfaces of an embedded system for analysis and demonstration. We have applied this approach to analyze the mission resiliency of an avionic computer being developed and demonstrate its operations in a scenario when the system is under attack.


hardware oriented security and trust | 2016

A key-centric processor architecture for secure computing

David Whelihan; Kate Thurmer; Michael Vai

We describe a novel key-centric processor architecture in which each piece of data or code can be protected by encryption while at rest, in transit, and in use. Using embedded key management for cryptographic key handling, our processor permits mutually distrusting software written by different entities to work closely together without divulging algorithmic parameters or secret program data. Since the architecture performs encryption, decryption, and key management deeply within the processor hardware, the attack surface is minimized without significant impact on performance or ease of use. The current prototype implementation is based on the Sparc architecture and is highly applicable to small to medium-sized processing loads.


ieee high performance extreme computing conference | 2013

Instruction set extensions for photonic synchronous coalesced accesses

Paul Keltcher; David Whelihan; Jeffrey J. Hughes

Microprocessors have evolved over the last forty-plus years from purely sequential single operation machines, to pipelined super-scalar, to threaded and SIMD, and finally to multi-core and massive multi-core/thread machines. Despite these advances, the conceptual model programmers use to program them is still that of a single threaded register file bound math unit that can only be loosely synchronized with other such processors. This lack of explicit synchrony, caused by limitations of metal interconnect, limits parallel efficiency. Recent advances in silicon photonic-enabled architectures [1, 5, 7] promise to greatly enable high synchrony over long distances (centimeters or more). In this paper, it is shown that global synchrony changes the way computers can be programmed by introducing a new class of ISA level instruction: the globally-synchronous load-store. In the context of multiple load-store machines, the globally synchronous load-store architecture allows the programmer to think about a collection of independent load-store machines as a single load-store machine. This operation is described, and its ISA implications explored in the context of the distributed matrix transpose, which exhibits a high degree of data non-locality, and is difficult to efficiently parallelize on modern architectures.


computer and communications security | 2013

POSTER: SHAMROCK: self contained cryptography and key management processor

Daniil M. Utin; Roger Kazan; Joshua Kramer; Michael Vai; David Whelihan

In this poster, we describe a one-size-fits-many Intellectual Property (IP) core which integrates advanced key management technology and streaming encryption into a single component to protect data in-transit.


military communications conference | 2017

Designing agility and resilience into embedded systems

David Whelihan; Michael Vai; N. Evanich; K. J. Kwak; J. Li; M. Britton; B. Frantz; D. Hadcock; M. Lynch; D. Schafer; J. DeMatteis; D. Russo

Cyber-Physical Systems (CPS) such as Unmanned Aerial Systems (UAS) sense and actuate their environment in pursuit of a mission. The attack surface of these remotely located, sensing and communicating devices is both large, and exposed to adversarial actors, making mission assurance a challenging problem. While best-practice security policies should be followed, they are rarely enough to guarantee mission success as not all components in the system may be trusted and the properties of the environment (e.g., the RF environment) may be under the control of the attacker. CPS must thus be built with a high degree of resilience to mitigate threats that security cannot alleviate. In this paper, we describe the Agile and Resilient Embedded Systems (ARES) methodology and metric set. The ARES methodology pursues cyber security and resilience (CSR) as high level system properties to be developed in the context of the mission. An analytic process guides system developers in defining mission objectives, examining principal issues, applying CSR technologies, and understanding their interactions.


military communications conference | 2016

SHAMROCK: A Synthesizable High Assurance Cryptography and Key management coprocessor

David Whelihan; Michael Vai; Daniil M. Utin; Roger I. Khazan; Karen Gettings; Thomas A. Anderson; Antonio Godfrey; Raymond Govotski; Mark Yeager; Brendon Chetwynd; Ben Nahill; Eric Koziel

For performance, maintainability and usability, military communications systems must properly integrate and coordinate cryptographic primitives and use adequate key management schemes. In this paper, we present a SHAMROCK (Synthesizable High Assurance Management/Reservation/Operation of Cryptography and Keys) coprocessor. Being self-contained and synthesizable, SHAMROCK empowers designers to readily and correctly incorporate cryptography and key management into embedded systems. SHAMROCK has been incorporated in multiple mission critical systems to enable secure computing and communications.


Archive | 2013

Cryptography and key management device and architecture

Roger I. Khazan; Joshua Kramer; Daniil M. Utin; Mankuan Michael Vai; David Whelihan


Archive | 2013

Data security using inter-zone gate circuits

Roger I. Khazan; Joshua Kramer; Daniil M. Utin; Mankuan Michael Vai; David Whelihan


international parallel and distributed processing symposium | 2013

P-sync: A Photonically Enabled Architecture for Efficient Non-local Data Access

David Whelihan; Jeffrey J. Hughes; Scott M. Sawyer; Eric Robinson; Michael M. Wolf; Sanjeev Mohindra; Julie Mullen; Anna Klein; Michelle S. Beard; Nadya T. Bliss; Johnnie Chan; Robert Hendry; Keren Bergman; Luca P. Carloni

Collaboration


Dive into the David Whelihan's collaboration.

Top Co-Authors

Avatar

Michael Vai

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Roger I. Khazan

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Daniil M. Utin

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Joshua Kramer

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Jeffrey J. Hughes

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Ben Nahill

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

D. Schafer

Air Force Research Laboratory

View shared research outputs
Top Co-Authors

Avatar

J. DeMatteis

Air Force Research Laboratory

View shared research outputs
Top Co-Authors

Avatar

Kate Thurmer

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

M. Britton

Alion Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge