Our research addresses the security problems in hardware design by developing novel design-automation algorithms and circuit techniques to ensure the trustworthiness of computers with provable security guarantees. The broad goals of our research are to address the general problem of hardware security more holistically. By empowering hardware with security techniques, our research has been:
- transferring control over a hardware design back to the fabless chip designers, who had relinquished their control to reduce manufacturing cost by outsourcing;
- ensuring the trustworthiness and security of electronic components;
- successfully combating the rogue elements as they intrude into the supply chain;
- developing tools and techniques to enforce the security of hardware;
- exposing the security capabilities of emerging technologies;
- detecting and patching security vulnerabilities in System-on-Chips (SoCs).
To this end, we are working on:
- Supply-chain security:Logic locking, Split manufacturing and Camouflaging
- Security of System-on-Chips: Hardware Fuzzing, Hack@Event, and HardFails
SUSHI (Sustainable Hardware Security) 2022–Present:
An annual interactive workshop on hardware security for industry, government, and chip designers. Sponsors: NSF, Crossings, and Synopsys
The World’s largest hardware security competition for students, professionals, practitioners, and hobbyists. Sponsors: NSF, Crossings, Intel, and Synopsys
We are recruiting!
If you are a Texas A&M student (graduate or undergraduate) and are interested in our research, please reach out to us by sending your CV to email@example.com.