Examples of potential vulnerabilities include counterfeit devices, malicious hardware trojans, intellectual property theft, and leakage of sensitive information. Conventional microelectronics development has focused on the optimization of power, performance, and area constraints. These optimizations often come at the expense of hardware security. For this reason, the mitigation of these hardware security vulnerabilities requires drastic changes to the status quo of microelectronics design, assessment, validation, and verification. Effective research in these areas calls for multidisciplinary teams capable of developing novel techniques for a broad array of state-of-the-art microelectronics systems.
Centauri has built a research and development team to derive a fundamental understanding of hardware security vulnerabilities and establish novel design and verification techniques for state-of-the-art defense and industrial microelectronics. The team aims to develop best-practices for microelectronics development to ensure security throughout the global supply chain. This includes the fabrication of integrated circuits in untrusted foundries without compromising intellectual property, the detection and prevention of counterfeits and hardware trojans, and the mitigation of side-channel leakage of sensitive information.
Centauri experts deliver comprehensive support to all aspects of our clients’ cyber programs.
Centauri makes maximum use of available technologies to deliver realistic and relevant training and simulations to cyber operators.
The digital landscape is quickly becoming the dominant battlefield of the 21st Century. Attacks perpetrated by nation-state actors, cyber criminals, hacktivists, and insider threats all pose a significant risk to an organization's information and information systems. From theft of intellectual property, accidental or intentional information deletion, or data alteration from the latest ransomware strain, organizations need a cybersecurity partner with the knowledge and experience to defend against these asynchronous threats.
Technology changes rapidly, as do adversary tactics, which requires defenders to continually improve their craft to detect, deter, and defeat system and network intrusions. Waiting for an attack to gain those skills in a production environment puts us at a disadvantage.
America doesn’t send soldiers into battle without first receiving training on their primary weapon. Every service member trains for many hours at the weapons range as part of their basic training and throughout their career. Today, cyber weapons are the primary weapon for many operations. The operators of these cyber weapons require extensive training on those tools, tactics and techniques as well.