- New Center LaunchedWe are proud to announce the launch of CHEST – the Center for Hardware and Embedded Systems Security and Trust. With the support of the National Science Foundation, Northeastern University, the University of California at Davis, the University of Cincinnati, the University of Connecticut, the University of Texas at Dallas, and the University of Virginia […]
The mission of the CHEST Center is to address the research challenges that industry faces in the design, protection, and resilience of hardware from the security vulnerabilities associated with electronic hardware and embedded systems and develop the much needed workforce for government and industry.
The CHEST Center is funded by a combination of National Science Foundation grants and memberships by industry and non-profit institutions, and CHEST coordinates university-based research with partner needs to advance knowledge of security, assurance, and trust for electronic hardware and embedded systems.
CHEST areas of interest include identification, detection, monitoring, mitigation, and elimination of vulnerabilities that affect hardware and embedded systems. More specifically, CHEST covers all levels of hardware and embedded systems design: system, architectural, board, microprocessor, embedded system, application specific integrated circuit (ASIC), field programmable gate array (FPGA), and other circuits. Threats to hardware and embedded devices cover a broad range of attack vectors with the integration of design, manufacturing, supply chains, operations, and complex assemblies of hardware, software, and firmware. Vulnerabilities can be introduced at any hardware design level and any stage of the product lifecycle. The NSF CHEST Center addresses security, assurance, and trust across all levels and stages. The Center is inventing and disseminating technologies, practices, and guidelines to stakeholders and educating a next generation of experts.
Areas of research include: hardware assurance, counterfeit detection, integrated circuit authentication, anti-reverse engineering and anti-tampering, secure communication protocols, formal verification, secure processor architectures, vulnerability analysis, infrastructure safety and resilience, and secure systems engineering.