Trustworthiness and Security


Nowadays, the production of the Integrated Circuits (ICs) requires several parties, for instance, a third party for intellectual property (IP) cores and a third party for Electronic Design Automation (EDA)tools. Therefore, security challenges and threats to ICs are steadily and rapidly growing such as hardware trojan insertion, IP piracy, IC tampering, and IC cloning. In the last decade, several attacks have been proposed by exploiting the vulnerabilities of IC-hardware design. Our research focuses on devising and developing hardware-based security solutions and countermeasures to face such attacks and threats. On the other hand, we focus on designing a new method for building hardware-trojans as well.   

Hardware Security

We focus on the following advance and hot topics in the field of  hardware security and hardware-based security solutions :  

  • Designing and Developing a secure Processor architecture ( Open-Source RISC-V-based).
  • Embedded System Security for the Internet-of-Things (IoT):Implementing and evaluating security functionality and cryptographic algorithms on SoC/FPGAs.
  • Designing and developing new hardware-based approaches in the field of security of Internet-of-Medical-things (IoMT).  
  • Designing and developing a new approach based on Physical Unclonable functions (PUFs) for anti-Counterfeiting and ant-cloning ICs.  
  • Designing and implementing a new approach for Hardware IP Watermarking as a watermarking in Physical Level FPGA Design.
  • Cryptographic processors.
  • Designing cryptographic processors.
  • Threat Model for Embedded System Devices.
  • Hardware Security Module in Industrial IoT devices.
  • FPGA and edge computing for IoT.


Modern IC-production line includes several vendors and suppliers. Part of them is considered as untrusted parties. This production model can be threatened by any parties in every phase of IC-production line. This leads to affecting the reliability and security of the ICs. We focus on the following advance topics in Trustworthy Electronics:

  • Developing a new hardware Trojan detection method based on Machine learning algorithms.
  • Developing Process Specific Functions for detecting hardware Trojans. 
  • Developing a new formal verification technique for Trojan-free trusted ICs.
  • Designing and developing a new ant-Reverse Engineering technique.
  • Designing and developing a new hardware root of trust to be deployed in the rusted computing for embedded systems.  
  • Probing Attacks on ICs.
  • Designing a new method for constructing and building Hardware Trojans.
Modern Supply Chain: IC development steps and their vulnerabilities