Research

CHEST will cover Security and Trust at the

  1. systems/application level
  2. architectural and board level
  3. embedded-device level
  4. FPGA and ASIC level
  5. circuit level (including analog, RF, and digital).

While these areas are not completely distinct, they provide a context to focus the Center’s individual efforts and provide complete system coverage.  In the context of the higher levels of abstraction (IoT, CPS, and embedded systems) for the Center to be impactful and consequential, the R&D roadmap will be driven by the needs of industry and advanced by faculty fundamental and applied research. Industry partners at this level are leaders in semiconductors, consumer and industrial sectors and contribute to significant parts of our national critical infrastructure. The university partners in these areas are leaders in HW and computer security, hardware/software (HW/SW) co-design, and risk/resilience/safety of engineering systems and infrastructure.

At the lower levels of system hierarchy that include both FPGAs and digital, analog and RF ASICs, the focus of the industry partners as they relate to the proposed Center is primarily divided between circuit design, development, implementation, and fielding; fabrication in advanced technology nodes; computer aided design (CAD) tool development; validation, verification, and testing; and system integration. Within each of these areas there are significant issues and concerns related to HW security and trust. The government partners are addressing issues related to secure, trusted, affordable, and sustainable militarily relevant electronics. Through this proposed I/UCRC, their technology development is scoped to address legacy parts, parts in development, and parts yet to be designed. Here, the university partners have strong programs in HW development, HW security and trust, and cyber security. The proposed Center will exploit foundational science and technology to ensure trustworthiness of microelectronic supply chains from system level specification all the way through decommissioning. For example, the topic of device and HW obsolescence, related to security and trust, is critical for many partners.