Computer Architecture, Embedded Systems, and Hardware Design

Trustworthiness Lab


High level of security, reliability, safety, and privacy are required for an accurate prediction of electronic system behavior.  The term "Trustworthy Electronics" indicates a predictable behavior of electronic systems.
Our "trustworthiness" lab focuses on devising and developing hardware-based solutions to the current problems of trustworthy electronics. Our research interests are in the area of designing trusted computing platforms,  security by design, reliability in Electronics. In particular, we are working on developing a new secure and safe processor design, designing an efficient hardware cryptographic accelerator,  devising a new hardware device identity, and verifying the functionality and security of computing platforms.   

Lab Activities:

1. Trustworthy Electronics

We focus on the following advance and hot topics in the field of  hardware security and hardware-based security solutions :  

  • Designing and Developing a secure Processor architecture ( Open-Source RISC-V-based).
  • Designing trustwsorthy AI- Accelerator.
  • Designing Secure Cryptographic Accelerator.
  • Designing new Accelerators for Homomorphic Encryption.
  • Developing Hardware Root of Trust: OpenTitan-based.
  • Implementing and evaluating the trustworthniss of SoCs.
  • Designing Cryptographic Engine.
  • Investigating the threat Model for Embedded System Devices.

2. Design for Hardware Trust

Modern IC-production line includes several vendors and suppliers. Part of them is considered as untrusted parties. This production model can be threatened by any parties in every phase of IC-production line. This leads to affecting the reliability and security of the ICs. We focus on the following advance topics in Trustworthy Electronics:

  • Developing a new hardware Trojan detection method based on Machine learning algorithms.
  • Developing Process Specific Functions for detecting hardware Trojans. 
  • Developing a new formal verification technique for Trojan-free trusted ICs.
  • Designing and developing a new anti-Reverse Engineering technique.
  • Designing and developing a new hardware root of trust to be deployed in the rusted computing for embedded systems.  
  • Designing and developing a new approach based on Physical Unclonable functions (PUFs) for anti-Counterfeiting and ant-cloning ICs.  
  • Designing and implementing a new approach for Hardware IP Watermarking as a watermarking in Physical Level Design.
  • Designing a new method for constructing and building Hardware Trojans.
Modern Supply Chain: IC development steps and their vulnerabilities

3. System Model for Trustworthiness Analysis

we focus on designing and developing System Models of processors and accelerators by using SystemC. Then we use these models to analyze the trustworthiness in the early design stage as follows:

  • Analyzing the fault behavior and propagation.
  • Analyzing the security level.
  • Verifying the safety of the design .

4. Reliability in Electronics

We focus on the following advance and hot topics in the field of reliability in electronics and reliability engineering:

  • Designing and developing reliable RRAM-based Accelerators.
  • Designing a reliable cryptographic Accelerator..
  • Analysing and evaluating SoC Reliability.
  • Developing HW-SW co-verification technique for reliable IPs and ICs.

Trustworthiness Lab Publications


Bernhard Bauer, Mouadh Ayache, Saleh Mulhem, Meirav Nitzan, Jyotika Athavale, Rainer Buchty, and Mladen Berekovic.
On the Dependability Lifecycle of Electrical/Electronic Product Development: The Dual-Cone V-Model,in Computer, vol. 55, no. 9, pp. 99-106, Sept. 2022.