CHEST color logo
CHEST University logos

The CHEST IAB 2020 research portfolio

The CHEST portfolio is guided by the Industrial Advisory Board (IAB). The IAB shaped the overall technical direction of the CHEST portfolio by providing cyber security topic areas that addressed their top cybersecurity and trust priorities. The CHEST member universities created many proposals across the different topic areas. Finally, the IAB reviewed all proposals and voted on those proposals that best fulfilled cybersecurity priorities. IAB guidance has led to the sixteen best new cybersecurity and trust research projects that encompass a robust set of technologies and strengthen our national cybersecurity.


image of a line

CHEST 2020 Research Projects


P1_20: Asynchronous Design for Side-Channel Avoidance
Topic Areas: Side Channel Attacks, Trojans
Principal investigator: Dr. J. M. Emmert, University of Cincinnati
Co-Principal investigator(s): Dr. Ranga Vemuri, University of Cincinnati
P1_20 Abstract
PI Email


P2_20: Connectionless RFID based Secure Supply Chain Management
Topic Areas: Secure Supply Chain Management
Principal investigator: Dr. Marten van Dijk, University of Connecticut
Co-Principal investigator(s): Dr. Ulrich Ruhrmair, University of Connecticut
Co-Principal investigator(s): Dr. J. M. Emmert, University of Cincinnati
Co-Principal investigator(s): Dr. Carla Purdy, University of Cincinnati
P2_20 Abstract
PI Email


P3_20: Reverse Engineering Methodology for FPGA Bitstreams
Topic Areas: Reverse Engineering, FPGA Trojans
Principal investigator: Dr. J. M. Emmert, University of Cincinnati
Co-Principal investigator(s): Dr. Carla Purdy, University of Cincinnati
Co-Principal investigator(s): Dr. Ronald Williams, University of Virginia
Co-Principal investigator(s): Dr. Zachary Collier, University of Virginia
P3_20 Abstract
PI Email


P4_20: Additive Components for Hardware Integrity Monitoring
Topic Areas: Additive Manufacturing, Aging and Reliability Monitoring
Principal investigator: Rashmi Jha, University of Cincinnati
Co-Principal investigator(s): Dr. Marc Cahay, University of Cincinnati
Co-Principal investigator(s): Dr. Punit Boolchand, University of Cincinnati
P4_20 Abstract
PI Email


P5_20: Cost-effective resource allocation to portfolios of security measures for embedded devices in a large-scale system
Topic Areas:
Principal investigator: Dr. James H. Lambert, University of Virginia
Co-Principal investigator(s): Dr. Zachary Collier, University of Virginia
Co-Principal investigator(s): Mr. Thomas A. Polmateer, University of Virginia
P5_20 Abstract
PI Email


P6_20: Trusted Enterprise Communications and Cyber-Physical Integration of Advanced Fleet Electrical Vehicle Chargers in a Mobile Electric Grid
Topic Areas:
Principal investigator: Dr. James H. Lambert, University of Virginia
Co-Principal investigator(s): Dr. Zachary Collier, University of Virginia
P6_20 Abstract
PI Email


P7_20: CAD Flow Development for Design Obfuscation through Post-Fabrication Transistor-Level Programming (TRAP)
Topic Areas: IP Protection
Principal investigator: Dr. Yiorgos Makris, University of Texas at Dallas
Co-Principal investigator(s): Dr. Benjamin Carrion Schaefer, University of Texas at Dallas
Co-Principal investigator(s): Dr. William Swartz Jr., University of Texas at Dallas
P7_20 Abstract
PI Email


P8_20: Design Obfuscation and Performance Locking Solutions for Analog/RF ICs
Topic Areas: Security and Trust Solutions for Analog/Mixed-Signal/RF Circuits and Systems
Principal investigator: Dr. Yiorgos Makris, University of Texas at Dallas
Co-Principal investigator(s): Dr. Andrew Marshall, University of Texas at Dallas
P8_20 Abstract
PI Email


P9_20: Formal Security Evaluation of Executing Untrusted Binaries on Embedded Processors
Topic Areas: System-Level Security Solutions
Principal investigator: Dr. Kevin Hamlen, University of Texas at Dallas
Co-Principal investigator(s): Dr. Yiorgos Makris, University of Texas at Dallas
P9_20 Abstract
PI Email


P10_20: Stochasticity, Polymorphism and Non-Volatility: Three Pillars of Security and Trust Intrinsic to Emerging Technologies
Topic Areas: Security and Trust in Emerging Technologies
Principal investigator: Dr. Joseph S. Friedman , University of Texas at Dallas
Co-Principal investigator(s): Dr. Yiorgos Makris, University of Texas at Dallas
P10_20 Abstract
PI Email


P11_20: Secure Processor Design by RISC-V Framework
Topic Areas: Design
Principal investigator: Dr. Yunsi Fei, Northeastern University
Co-Principal investigator(s): Prof. David Kaeli, Northeastern University
P11_20 Abstract
PI Email


P12_20: Current Sensing based On-chip Analog Trojan Detection Circuit Compatible with Chip Design and Validation Flow
Topic Areas:
Principal investigator: Dr. Aatmesh Shrivastava, Northeastern University
Co-Principal investigator(s): Dr. Yunsi Fei, Northeastern University
P12_20 Abstract
PI Email


P13_20: Cognitive Obfuscation Securing Circuits by Graph Convolutional Networks
Topic Areas: Reverse Engineering, Logic Locking
Principal investigator: Dr. Houman Homayoun, University of California Davis
P13_20 Abstract
PI Email


P14_20: NATE: A Neural Network Assisted Timing Profiling for Hardware Trojans Detection
Topic Areas: Hardware Trojan
Principal investigator: Dr. Houman Homayoun, University of California Davis
P14_20 Abstract
PI Email


P15_20: Connectionless RFID based Secure Supply Chain Management
Topic Areas: Secure Supply Chain Management
Principal investigator: Dr. Lei Wang, University of Connecticut
Co-Principal investigator(s): Dr. John Chandy, University of Connecticut
P15_20 Abstract
PI Email


P16_20: Leveraging Hardware Isolation for Secure Execution of Safety-Critical Applications in Distributed Embedded Systems
Topic Areas: Electronic HW and systems security
Principal investigator: Dr. Omer Khan, University of Connecticut
P16_20 Abstract
PI Email


Top