STARSS

group_project

Visible to the public SaTC: STARSS: Small: Combined Side-channel Attacks and Mathematical Foundations of Combined Countermeasures

Digital information has become an integral part of our daily lives and there is a growing concern about the security of information. The amount of information that should be kept secure is increasing with the proliferation of high-tech electronics such as smart-phones, tablets, and wearable devices. Accordingly, the number of attacks from malicious parties to obtain the secret information that is stored in a secure (i.e., encrypted) device increases.

group_project

Visible to the public STARSS: Small: Design of Light-weight RRAM based Hardware Security Primitives for IoT devices

Our society has become increasingly dependent on electronic information exchange between personal devices and the cloud. Unfortunately, the number of identity and secure information leaks is on the rise. Many of the security breaches are due to insecure access channels to the cloud. The security problem is likely to be exacerbated in the Internet-of-Things (IoT) era where billions of devices in our homes, offices and cars are digitally connected.

group_project

Visible to the public STARSS: Small: Collaborative: Physical Design for Secure Split Manufacturing of Ics

The trend of outsourcing semiconductor manufacturing to oversea foundries has introduced several security vulnerabilities -- reverse engineering, malicious circuit insertion, counterfeiting, and intellectual property piracy -- making the semiconductor industry lose billions of dollars. Split manufacturing of integrated circuits reduces vulnerabilities introduced by an untrusted foundry by manufacturing only some of the layers at an untrusted high-end foundry and the remaining layers at a trusted low-end foundry.

group_project

Visible to the public SaTC: STARSS: Small: Tackling the Corner Cases: Finding Security Vulnerabilities in CPU Designs

Computing hardware including processors, memory banks, and communication busses can harbor vulnerabilities that allow an attacker to gain unauthorized access to the programs and data on a machine. Hardware designers and security experts expend considerable time and effort to eliminate these vulnerabilities early in the design stage. The focus of this research is to support these activities towards improving efficiency and outcomes.

group_project

Visible to the public SaTC: STARSS: Small: Domain Informed Techniques for Detecting and Defending Against Malicious Firmware

Embedded systems play a large role in our daily lives. They are found in everything from computers and consumer electronics to appliances and automobiles, and represent a market estimated to be worth almost $160 billion. Many of them, however, use inexpensive microcontrollers that cannot easily be analyzed, so it is unclear how well they operate in practice. This work seeks improve the safety and security of these systems by developing techniques to analyze their firmware, particularly with regards to the popular Universal Serial Bus (USB) and Bluetooth protocols.

group_project

Visible to the public SaTC: STARSS: Small: Assuring Security and Privacy of Emerging Non-Volatile Memories

Conventional volatile memories such as static random-access memory (static RAM) suffer from significant leakage power whereas conventional storage class non-volatile memories (NVM) such as flash memory suffer from higher write energy, poor performance and low endurance. Emerging NVMs such as, spin-transfer torque RAM (STTRAM) and resistive RAM (ReRAM) offer zero leakage, high-density, scalability and high endurance. Due to these promising aspects, emerging NVMs are already being commercialized by several companies.

group_project

Visible to the public SaTC: STARSS: Small: Analog Hardware Trojans: Threats, Detection, and Mitigation

Vulnerability of electronic systems and particularly computing systems to malicious attacks through the insertion of software viruses or hardware Trojans is of growing concern to society. This work is focused on understanding, detecting, and mitigating a potentially devastating type of hardware Trojans that an adversary or hardware hacker can insert in the analog component of many of the integrated circuits that will be fabricated in the future.

group_project

Visible to the public SaTC: STARSS: Small: Collaborative: Design and Security Verification of Next-Generation Open-Source Processors

This project will develop new open-source processor architectures with advanced security features. The security features will be added to existing open-source processors to help protect the confidentiality and integrity of data and to protect against side-channel attacks. Beyond the design, the project will also provide new methodology to verify the proposed security feature, to provide assurance that the processor hardware itself is provably secure.

group_project

Visible to the public SaTC: STARSS: Small: Collaborative: Design and Security Verification of Next-Generation Open-Source Processors

This project will develop new open-source processor architectures with advanced security features. The security features will be added to existing open-source processors to help protect the confidentiality and integrity of data and to protect against side-channel attacks. Beyond the design, the project will also provide new methodology to verify the proposed security feature, to provide assurance that the processor hardware itself is provably secure.

group_project

Visible to the public SaTC: STARSS: Small: Analysis of Security and Countermeasures for Split Manufacturing of Integrated Circuits

Integrated circuit fabrication has spread across the globe, with over 90% of the world's fabrication capacity controlled by non-US companies. This project is on studying the security of chip fabrication by an untrusted foundry. The fabrication technique, known as split manufacturing, is based on partial sharing of the chip design information with the untrusted foundry in order to protect the intellectual property of the chip. With this technique, only a challenging portion of the chip is manufactured at the untrusted foundry.