Research Interests
Cybersecurity: System security including software, firmware and OS security. Hardware security including system-on-chip and network security attacks and countermeasures. Security validation using simulation, formal methods, and side-channel analysis. |
Machine Learning: Security and privacy analysis using machine learning algorithms. Adversarial machine learning including robustness validation of machine learning models as well as attacks on learning algorithms. |
Trustworthy Systems: Static and dynamic healing techniques to improve reliability of computer systems through memory based computing, temperature-aware optimizations and energy reduction techniques, validation and evaluation of IP security and trust. |
Quantum Computing: Quantum algorithms, quantum circuits, quantum compilation and control, quantum error correction, quantum synthesis, quantum machine learning, quantum verification, quantum cryptography. |
Embedded Systems: System-level modeling, design space exploration, HW/SW partitioning, lossless compression, real-time scheduling, and application-specific optimizations for improving area, power, performance, temperature and reliability. |
Energy-aware Computing: Energy-aware design and optimizations techniques at various abstraction levels including system, architecture, circuits and device levels using a combination of both design- and run-time reconfiguration techniques. |
Hardware Verification: Validation using a combination of simulation based techniques and formal methods, processor validation, instruction-set simulation, validation of system-on-chip designs, directed test generation. |
Post-Silicon Debug: Trace signal selection for observability improvement, efficient debug hardware design, high-level debug of post-silicon traces, techniques to reduce post-silicon validation and debug effort. |
Ongoing Projects
Title | Sponsors | Lead Researchers | Duration | ||||
Measurement-induced Quantum Steering | DARPA ARC (IMPAQT) | Daniel Volya | 2023 - 2024 | ||||
Automatic Implementation of Secure Silicon | DARPA (Synopsys) | Aruna Jayasena | 2020 - 2024 | ||||
Data Augmentation for Deflating Bias | Semiconductor Research Corporation | Zhixin Pan | 2023 - 2025 | ||||
Trusted Execution Environments | Semiconductor Research Corporation | Hasini Witharana | 2022 - 2025 | ||||
Secure Communication Architecture | National Science Foundation | Hansika Weerasena | 2019 - 2023 | ||||
Post-Silicon Security Validation | National Science Foundation | Zhixin Pan | 2019 - 2023 |
Completed Projects
Title | Sponsors | Lead Researchers | Duration | ||||
System-on-Chip Security Assertions | Semiconductor Research Corp | Hasini Witharana | 2020 - 2022 | ||||
Assertion-based Trust Validation | Edaptive (AFRL) | Daniel Volya | 2020 - 2021 | ||||
Reliable Quantum Computing | L3Harris | Daniel Volya | 2020 - 2021 | ||||
Microelectronics Security Education | US Air Force Research Lab | Zhixin Pan | 2019 - 2020 | ||||
SoC Security Verification | Cisco | Yangdi Lyu | 2018 - 2020 | ||||
Adversarial Machine Learning | FL Center for Cybersecurity | Yangdi Lyu | 2018 - 2019 | ||||
Computer Systems Security | US Department of Education | Six GAANN Fellows | 2015 - 2019 | ||||
Reconfiguration for Adaptive Computing | National Science Foundation | Subodha Charles | 2015 - 2019 | ||||
IP Trust Verification | Cisco | Farimah Farahmandi | 2016 - 2018 | ||||
Side Channel based Trojan Detection | Raytheon | Yangdi Lyu | 2017 - 2018 | ||||
Coverage Analysis without Monitors | IBM | Farimah Farahmandi | 2015 - 2018 | ||||
Validation of IP Security and Trust | NSF+SRC | Yuanwen Huang | 2014 - 2018 | ||||
Post-Silicon Validation and Debug | NSF | Kamran Rahmani | 2012 - 2017 | ||||
Authentication using Intrinsic Identifiers | Harris Seed Fund | Yuanwen Huang | 2016 - 2016 | ||||
Functional Verification of Multicore Architectures | NSF (CAREER) | Xiaoke Qin | 2008 - 2014 | ||||
Dynamic Reconfigurations in Real-Time Systems | NSF+SRC (MCDA) | Weixun Wang | 2009 - 2013 | ||||
Post-Silicon Trace Signal Selection | Intel | Kanad Basu | 2011 - 2012 | ||||
Lossless Compression and Embedded Encryption | NSF (CSR) | Xiaoke Qin | 2009 - 2011 | ||||
SOC Validation using Transaction Level Models | Intel | Mingsong Chen | 2006 - 2009 |
.::
::.