The Future of Advanced (Secure) Computing The Future of Advanced (Secure) Computing This material is based upon work supported by the Assistant Secretary of Defense for Research and Engineering under Air Force Contract No. FA8721-05-C-0002 and/or FA8702-15-D-0001. Any opinions, findings, conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the Assistant Secretary of Defense for Research and Engineering. Distribution Statement A: Approved for public release: distribution unlimited. 2018 Massachusetts Institute of Technology. Delivered to the U.S. Government with Unlimited Rights, as defined in DFARS Part 252.227-7013 or 7014 (Feb 2014). Notwithstanding any copyright notice, U.S. Government rights in this work are defined by DFARS 252.227-7013 or DFARS 252.227-7014 as detailed above. Use of this work other than as specifically authorized by the U.S. Government may violate any copyrights that exist in this work. Dr. Paul Monticciolo MIT Lincoln Laboratory 5 March 2018
Future Commercial Computing Technology Drivers Hardware Communications Software The Future of Advanced (Secure) Computing - 2
Future Commercial Computing Technology Drivers Hardware Communications Software Security The Future of Advanced (Secure) Computing - 3
The Digital Triad for National Defense 2 Cyber Technology DoD Applications Artificial Intelligence 3 1 Semiconductor Industry and Digital Microelectronics Challenge: independent development in each Triad component limits required secure computing solutions The Future of Advanced (Secure) Computing - 4 Addressed in other ARTS 18 sessions
Secure Computing Directions to Enable the Digital Triad for National Defense 1. Co-design across Triad to meet performance and cost goals for DoD applications 2. Exploit advances in commercially developed technologies where possible Cyber Technology 3. Leverage trusted DoD foundries to fabricate necessary components Artificial Intelligence The Future of Advanced (Secure) Computing - 5 U.S. Semiconductor and Microelectronics Industry
Expanding the Digital Triad Ecosystem for Advanced Secure Computing Broader Commercial (Second Gen Adopter) Specialized Commercial (Early Adopter) Example: Power industry Secure Processing Challenges in Building Secure Hardware Platforms An Inherently Secure Computer New hardware architecture New software/operating system Trusted HW manufacturing Advanced Data Protection Data-Centric Secure Computing Crypto-bound, efficient data provenance Specialized Military (Developer) 2018 2023 Mandate Incentivize Integrate Broad Approaches by DoD and Commercial Users Post-quantum cryptography Seamless crypto-key management Data-centric security The Future of Advanced (Secure) Computing - 6
Expanding the Digital Triad Ecosystem for Advanced Secure Computing Digital Triad synergy addresses critical defense applications and incentivizes future broader commercial adoption The Artificial Intelligence Era Quantum Computing with Trapped Ions and Superconducting Qubits Data Science and Technology Research Environment National-security focused AI technologies Coupled to secure computing and vanguard U.S. microelectronics Secure Processing Challenges in Building Secure Hardware Platforms An Inherently Secure Computer New hardware architecture New software/operating system Trusted HW manufacturing Advanced Data Protection Data-Centric Secure Computing Crypto-bound, efficient data provenance Post-quantum cryptography Seamless crypto-key management Data-centric security Broader Commercial (Second Gen Adopter) Specialized Commercial (Early Adopter) Example: Power industry Specialized Military (Developer) Trusted U.S. Semiconductor Industry 2018 Mandate Incentivize Integrate 2023 Broad Approaches by DoD and Commercial Users Integrated Secure AI Processor The Future of Advanced (Secure) Computing - 7
Session Overview Keynote Challenges in Building Secure Hardware Platforms Trusted Software Protected Environment Protect I/O Prof. Srini Devidas Identify Memory Security Advanced AI Technologies Graph Algorithms Presentations Graph Processor D4M GraphBLAS LLSC An Inherently Secure Computer Hamed Okhravi Data-Centric Secure Computing Emily Shen Quantum Computing Eric Dauler Data Science and Technology Research Environment Vitaliy Gleyzer Posters Custom Processor Architectures for Probabilistic Programming Processors Sensor Integration Algorithms Data Security Efficient Computing for the Internet of Things (IoT) Big Data Processing for DoD IoT and AI William Song/Michael Hurley Karen Gettings/Huy Nguyen Siddharth Samsi BigDAWG SQL NoSQL NewSQL GraphBLAS A E D B C The Future of Advanced (Secure) Computing - 8