Abstract
Recently the Korean government has established a law to protect the defense industrial technology for the sake of national security and is trying to apply the anti-tamper methodology to weapon systems acquisition programs. The anti-tamper refers to the system engineering activity to protect critical information in systems from tampering and reverse engineering. Adversary’s malicious tampering can weaken our military advantage, shorten the expected combat life of our system, and erode our defense industrial technological competitiveness. In this paper, we introduce the overview of the anti-tampering techniques and suggest a software protection technique using FPGA which can be efficiently used for weapon systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
US DoD Memorandum: Implementation of Anti-tamper (AT) Techniques in Acquisition Programs (1999)
Huber, I.I., Arthur, F., Scott, J.M.: The role and nature of anti-tamper techniques in U.S. defense acquisition (1999)
US USD (A&T) Memorandum: Guidelines for Implementation of Anti-tamper Techniques in Weapon System Acquisition Programs (2000)
US USD (A&T) Memorandum: Implementing Anti-Tamper (2001)
Pong, C.: FPGA Prototyping by VHDL Examples: Xilinx Microblaze MCS SoC, 2nd edn. Wiley, Hoboken (2017)
Underwood, K.: FPGAs vs. CPUs: trends in peak floating-point performance. In: 12th ACM International Symposium on Field-Programmable Gate Arrays (FPGA 2004), pp. 171–180. ACM Press (2004)
US General Accounting Office Report GAO-04-302: Defense acquisitions: DoD needs to better support program manager’s implementation of anti-tamper protection (2004)
Abaco Systems White Paper: Anti-tamper technology: safeguarding today’s COTS platforms (2016)
US DoD Directive 5000.01: The Defense Acquisition System (2003)
US DoD Instruction 5000.02: Operation of the Defense Acquisition System (2015)
US DoD Instruction 5200.39: Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation (RDT&E) (2015)
US DoD Directive 5200.47E: Anti-Tamper (2015)
US DoD DASD: Program protection plan outline & guidance, Version 1.0 (2011)
Raymond, S.: Identification and protection of critical program information (CPI). In: 18th Annual NDIA Systems Engineering Conference (2016)
Impulse C Homepage. http://www.Impulsec.com
Mitrion-C Homepage. http://www.mitrionics.com
CARTE Homepage. http://www.src-labs.com
Handel-C Homepage. http://www.mentor.com
Justin, T., Maya, G., Kristopher, P.: Trident: from high-level language to hardware circuitry. IEEE Comput. 40(3), 28–37 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Jang, M., Ryu, Y., Park, H. (2018). A FPGA-Based Scheme for Protecting Weapon System Software Technology. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2018. ICCSA 2018. Lecture Notes in Computer Science(), vol 10964. Springer, Cham. https://doi.org/10.1007/978-3-319-95174-4_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-95174-4_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-95173-7
Online ISBN: 978-3-319-95174-4
eBook Packages: Computer ScienceComputer Science (R0)