June 27–29, 2017
The College Park Marriott Hotel and Conference Center College Park, MD |
![]() |
Andrew Portune is the Director of R&D for Cyber-Physical Technologies at Nokomis, Inc.
The supply chain continues to be vulnerable to a spectrum of supply chain risks due to electronic part obsolescence. Complex electronic systems are often supported for multiple decades, especially in avionics, critical infrastructure, and defense applications. This is long past the supported life cycles of electronic parts. Electronic parts are thereby considered a high risk item for counterfeiting and malicious modification by adversaries who have growing access to defense supply chains. Conventional technologies for the detection of supply chain risks in multiple threat categories is perennially deficient, and have been proven in multiple independent studies to enable a significant flow of counterfeit and potentially subverted parts into the supply chain.
The Advanced Detection of Electronic Counterfeits (ADEC) technology has been demonstrated capable of providing reliable coverage to a broader range of supply chain threats than that afforded by conventional methods. Spectral signatures have been shown to provide clear indicators of counterfeit parts. Recent results have demonstrated the ability to detect sophisticated types of counterfeits, such as cloned parts, as well as intentionally modified components that could be used to subvert electronic systems.
This presentation will show recent results with various Government entities for reliable detection of next-generation cyber-physical security threats. In addition, broader uses for ADEC in enhancing supply chain assurance will be presented, including the ability to verify part lineage and electronic health status through advanced emission signature analyses. The adoption of this approach by standard bodies such as the SAE AS6171 standard will be discussed as a means for implementing this approach across multiple tiers of the supply chain. ADEC’s ability to address the broad risk posed by counterfeit and malicious parts will be discussed as well as recent ADEC use cases.