Special Notice: ENERGY, DEPARTMENT OF is seeking a Tech Licensing Opportunity for Generative Adversarial Networks (GANs) for EM Signature Generation. This technology aims to synthetically generate electromagnetic (EM) signatures from assembly instructions using GANs, enhancing software security analysis.
Traditionally, firmware and software verification involves side-channel analysis, which is a labor-intensive method that captures analog signals to detect vulnerabilities or unauthorized changes in software. However, this method can be complex and time-consuming, leading to high costs and extended timelines.
The proposed technology automates the generation of EM signatures directly from code using GANs. By automating this process, it simplifies and accelerates the detection of vulnerabilities in software, especially in embedded devices. This technology promises to significantly reduce the cost and complexity of side-channel analysis, potentially revolutionizing software security verification before deployment.
Key advantages of this technology include automating the generation of EM signatures, facilitating rapid and reliable anomaly detection in software, reducing the overall cost and time required for side-channel analysis, enabling offline verification of software for side-channel vulnerabilities, and improving the robustness of security analysis against environmental and equipment variability.
This technology solves the problems of time-consuming and error-prone manual capturing of EM signals for side-channel analysis, limited applicability of traditional side-channel analysis methods due to their dependency on physical signal capturing, high cost and complexity of ensuring software security in embedded and mission-critical systems, and difficulty in detecting firmware and software-level modifications through conventional methods.
Potential market applications for this technology include software security verification, vulnerability identification in embedded devices, and education and research in cybersecurity. It is ideal for companies and organizations looking to secure their software against side-channel attacks before deployment, industries deploying embedded systems in mission-critical environments, and academic institutions and research centers focusing on advanced cybersecurity solutions.
The technology is currently at Technology Readiness Level (TRL) 3 and has a US Provisional Patent Application. The contact person for further discussions and licensing opportunities is Andrew Rankin at andrew.rankin@inl.gov. For more information, visit https://inl.gov/technology-deployment/.