Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Michael Vai is active.

Publication


Featured researches published by Michael Vai.


ieee high performance extreme computing conference | 2015

Secure architecture for embedded systems

Michael Vai; Ben Nahill; Joshua Kramer; M. W. Geis; Daniil M. Utin; David Whelihan; Roger I. Khazan

Devices connected to the internet are increasingly the targets of deliberate and sophisticated attacks [1]. Embedded system engineers tend to focus on well-defined functional capabilities rather than “obscure” security and resilience. However, “after-the-fact” system hardening could be prohibitively expensive or even impossible. The co-design of security and resilience with functionality has to overcome a major challenge; rarely can the security and resilience requirements be accurately identified when the design begins. This paper describes an embedded system architecture that decouples secure and functional design aspects.


ieee high performance extreme computing conference | 2016

Systems design of cybersecurity in embedded systems

Michael Vai; David Whelihan; N. Evancich; K. J. Kwak; J. Li; M. Britton; J. Foley; M. Lynch; D. Schafer; J. DeMatteis

Mission critical embedded systems should be capable of performing intended functions with resiliency against cyberattacks. The methodology of design-for-cybersecurity is now widely recognized, in which the effects of cybersecurity, or lack thereof, on system objectives must be determined. However, developers are often challenged by the difficulty of analyzing a system-under-design without complete specifics. In this paper, we describe a systems design approach, which incrementally models the cybersecurity architecture, components, and interfaces of an embedded system for analysis and demonstration. We have applied this approach to analyze the mission resiliency of an avionic computer being developed and demonstrate its operations in a scenario when the system is under attack.


hardware oriented security and trust | 2016

A key-centric processor architecture for secure computing

David Whelihan; Kate Thurmer; Michael Vai

We describe a novel key-centric processor architecture in which each piece of data or code can be protected by encryption while at rest, in transit, and in use. Using embedded key management for cryptographic key handling, our processor permits mutually distrusting software written by different entities to work closely together without divulging algorithmic parameters or secret program data. Since the architecture performs encryption, decryption, and key management deeply within the processor hardware, the attack surface is minimized without significant impact on performance or ease of use. The current prototype implementation is based on the Sparc architecture and is highly applicable to small to medium-sized processing loads.


computer and communications security | 2013

POSTER: SHAMROCK: self contained cryptography and key management processor

Daniil M. Utin; Roger Kazan; Joshua Kramer; Michael Vai; David Whelihan

In this poster, we describe a one-size-fits-many Intellectual Property (IP) core which integrates advanced key management technology and streaming encryption into a single component to protect data in-transit.


military communications conference | 2017

Designing agility and resilience into embedded systems

David Whelihan; Michael Vai; N. Evanich; K. J. Kwak; J. Li; M. Britton; B. Frantz; D. Hadcock; M. Lynch; D. Schafer; J. DeMatteis; D. Russo

Cyber-Physical Systems (CPS) such as Unmanned Aerial Systems (UAS) sense and actuate their environment in pursuit of a mission. The attack surface of these remotely located, sensing and communicating devices is both large, and exposed to adversarial actors, making mission assurance a challenging problem. While best-practice security policies should be followed, they are rarely enough to guarantee mission success as not all components in the system may be trusted and the properties of the environment (e.g., the RF environment) may be under the control of the attacker. CPS must thus be built with a high degree of resilience to mitigate threats that security cannot alleviate. In this paper, we describe the Agile and Resilient Embedded Systems (ARES) methodology and metric set. The ARES methodology pursues cyber security and resilience (CSR) as high level system properties to be developed in the context of the mission. An analytic process guides system developers in defining mission objectives, examining principal issues, applying CSR technologies, and understanding their interactions.


military communications conference | 2017

Towards a universal CDAR device: A high-performance adapter-based inline media encryptor

Benjamin Nahill; Aaron Mills; Martin Kiernicki; David A. Wilson; Michael Vai; Roger I. Khazan; John Sherer

As the rate at which digital data is generated continues to grow, so does the need to ensure that data can be stored securely. The use of an NSA-certified Inline Media Encryptor (IME) is often required to protect classified data, as its security properties can be fully analyzed and certified with minimal coupling to the environment in which it is embedded. However, these devices are historically purpose-built and must often be redesigned and recertified for each target system. This tedious and costly (but necessary) process limits the ability for an information system architect to leverage advances made in storage technology. Our universal Classified Data At Rest (CDAR) architecture represents a modular approach to reduce this burden and maximize interface flexibility. The core module is designed around NVMe, a high-performance storage interface built directly on PCIe. Interfacing with non-NVMe interfaces such as SATA is achieved with adapters which are outside the certification boundary and therefore can be less costly and leverage rapidly evolving commercial technology. This work includes an analysis for both the functionality and security of this architecture. A prototype was developed with peak throughput of 23.9 Gb/s at a power consumption of 8.5W, making it suitable for a wide range of storage applications.


international midwest symposium on circuits and systems | 2017

Optical physical unclonable function

M. W. Geis; Karen Gettings; Michael Vai

Many military and commercial systems require a unique digital identification for authentication, key derivation, and other purposes. Our approach uses an optical physical unclonable function (PUF) that can be implemented on printed circuit boards (PCB). Various environmental factors, such as physical stress, temperature, heat dissipation, and aging, affect the effectiveness of such a PUF. This paper will discuss our recent research in addressing these and other concerns by advancing in the areas of waveguide construction, system longevity, and PCB cooling. We will also discuss the enhanced capability of differentiating between intact and disturbed systems.


hardware oriented security and trust | 2017

Fabrication security and trust of domain-specific ASIC processors

Michael Vai; Karen Gettings; Theodore M. Lyszczarz

Application specific integrated circuits (ASICs) are commonly used to implement high-performance signal-processing systems for high-volume applications, but their high development costs and inflexible nature make ASICs inappropriate for algorithm development and low-volume DoD applications. In addition, the intellectual property (IP) embedded in the ASIC is at risk when fabricated in an untrusted foundry. Lincoln Laboratory has developed a flexible signal-processing architecture to implement a wide range of algorithms within one application domain, for example radar signal processing. In this design methodology, common signal processing kernels such as digital filters, fast Fourier transforms (FFTs), and matrix transformations are implemented as optimized modules, which are interconnected by a programmable wiring fabric that is similar to the interconnect in a field programmable gate array (FPGA). One or more programmable microcontrollers are also embedded in the fabric to sequence the operations. This design methodology, which has been termed a coarse-grained FPGA, has been shown to achieve a near ASIC level of performance. In addition, since the signal processing algorithms are expressed in firmware that is loaded at runtime, the important application details are protected from an unscrupulous foundry.


military communications conference | 2016

SHAMROCK: A Synthesizable High Assurance Cryptography and Key management coprocessor

David Whelihan; Michael Vai; Daniil M. Utin; Roger I. Khazan; Karen Gettings; Thomas A. Anderson; Antonio Godfrey; Raymond Govotski; Mark Yeager; Brendon Chetwynd; Ben Nahill; Eric Koziel

For performance, maintainability and usability, military communications systems must properly integrate and coordinate cryptographic primitives and use adequate key management schemes. In this paper, we present a SHAMROCK (Synthesizable High Assurance Management/Reservation/Operation of Cryptography and Keys) coprocessor. Being self-contained and synthesizable, SHAMROCK empowers designers to readily and correctly incorporate cryptography and key management into embedded systems. SHAMROCK has been incorporated in multiple mission critical systems to enable secure computing and communications.


Archive | 2015

Secure Embedded Systems

Michael Vai; David Whelihan; Benjamin Nahill; Dan Utin; Sean O'Melia; Roger I. Khazan

Collaboration


Dive into the Michael Vai's collaboration.

Top Co-Authors

Avatar

David Whelihan

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Roger I. Khazan

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Daniil M. Utin

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Eric Koziel

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Karen Gettings

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Ben Nahill

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Benjamin Nahill

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

D. Schafer

Air Force Research Laboratory

View shared research outputs
Top Co-Authors

Avatar

J. DeMatteis

Air Force Research Laboratory

View shared research outputs
Top Co-Authors

Avatar

Joshua Kramer

Massachusetts Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge