This area is on security and trust enhancement from the hardware perspective, protect attacks coming in the form of compromising a physical device. Hardware security is essential and provide more robust security than what software is capable of. To protect the security of a hardware device, it is important to be able to assess the vulnerabilities from manufacturing and from other potential sources like code running and data I/O on a network. This area includes the following topics:

  • Hardware Trojan
  • Trusted IC Design
  • Side-Channel Attacks
  • Split Manufacturing

Academic Staff: XU Qiang, YU Bei