CHEST color logo
CHEST University logos

The CHEST IAB 2022 research portfolio

The CHEST portfolio is guided by the Industrial Advisory Board (IAB). The IAB shaped the overall technical direction of the CHEST portfolio by providing cyber security topic areas that addressed their top cybersecurity and trust priorities. The CHEST member universities created many proposals across the different topic areas. Finally, the IAB reviewed all proposals and voted on those proposals that best fulfilled cybersecurity priorities. IAB guidance has led to the sixteen best new cybersecurity and trust research projects that encompass a robust set of technologies and strengthen our national cybersecurity.


image of a line

CHEST 2022 Research Projects


P1_22: Towards Robust Cross-Device Side-Channel Attacks
Topic Areas: Side-Channel Attacks, Machine Learning
Principal investigator: Dr. Boyang Wang, University of Cincinnati
Co-Principal investigator: Dr. J. M. Emmert, University of Cincinnati
P1_22 Abstract
PI Email


P2_22: Reverse Engineering Methodology for FPGA Firmware
Topic Areas: Design Reverse Engineering, FPGA Trojans, Where’s Waldo
Principal investigator: Dr. J. M. Emmert, University of Cincinnati
Co-Principal investigator(s): Dr. Nicola Bezzo, Dr. James H. Lambert and Dr. Zachary Collier, University of Virginia
Co-Principal investigator(s): Dr. Ranga Vemuri, University of Cincinnati
P2_22 Abstract
PI Email


P3_22: On-Chip and Continuous Monitoring of EM Signals for Secure Microelectronics and its Obfuscation Techniques
Topic Areas: Parasitic EM Signature Obfuscation, New Approaches to Secure On-Shore Microelectronics Design and Manufacturing
Principal investigator: Dr. Rashmi Jha, University of Cincinnati
Co-Principal investigator(s): Dr. J. M. Emmert, University of Cincinnati
P3_22 Abstract
PI Email


P4_22: Synthetic and Natural Benchmarks for Hardware Security and Trust
Topic Areas: Database of updated benchmark designs
Principal investigator: Dr. Ranga R. Vemuri, University of Cincinnati
Co-Principal investigator(s): Dr. J. M. Emmert, University of Cincinnati
P4_22 Abstract
PI Email


P5_22: Automated Synthesis and Validation of On-Chip Security Integrity Monitors
Topic Areas: On-Chip Monitoring of ASIC Integrity from Design Through Fabrication and Fielding
Principal investigator: Dr. Ranga R. Vemuri, University of Cincinnati
P5_22 Abstract
PI Email


P6_22: ARIA: Additive Components for Hardware Reliability, Integrity, and Aging Monitoring
Topic Areas: IP Protection
Principal investigator: Dr. Rashmi Jha, University of Cincinnati
Co-Principal investigator(s): Dr. Marc Cahay, University of Cincinnati
P6_22 Abstract
PI Email


P7_22: Assuring Trust in CHEST Devices with Near Optimal Data Collection and Distributed Sensors
Principal investigator: Dr. Negin Alemazkoor, University of Virginia
Co-Principal investigator(s): Dr. Arsalan Heydarian, Dr. James H. Lambert
P7_22 Abstract
PI Email


P8_22: Feedback Control of Hardware Security Countermeasures with Deep Reinforcement Learning
Topic Areas: Formal Verification / Methods, Integrity Monitoring, Risk Mitigation
Principal investigator: Dr. Afsaneh Doryab, University of Virginia
Co-Principal investigator: Dr. James H. Lambert, University of Virginia
P8_22 Abstract
PI Email


P9_22: Security Audit Dashboard for Embedded Hardware Devices of Industrial Facilities
Topic Areas: Risk Mitigation; Supply Chain Integrity
Principal investigator: Dr. James H. Lambert, University of Virginia
Co-Principal investigator: Dr. Zachary A. Collier, University of Virginia
P9_22 Abstract
PI Email


P10_22: Playbook for Stress Testing and Resilience of Semiconductor Supply Chains
Topic Areas: Risk Mitigation; Supply Chain Integrity
Principal investigator: Dr. James H. Lambert, University of Virginia
Co-investigator(s): Dr. Zachary A. Collier, University of Virginia
P10_22 Abstract
PI Email


P11_22: Risk-aware Detection, Prediction, and Mitigation in CPS under Cyber-Attack
Topic Areas: Integrity Monitoring, Security Attacks, Side Channel Attacks, Tamper Resistance/Anti-tamper, Risk Mitigation
Principal investigator: Nicola Bezzo, University of Virginia
Co-investigator: Dr. James H. Lambert, University of Virginia
P11_22 Abstract
PI Email


P12_22: Stochasticity, Polymorphism and Non-Volatility: Three Pillars of Security and Trust Intrinsic to Emerging Technologies
Topic Areas: Security and Trust in Emerging Technologies
Principal investigator: Dr. Joseph S. Friedman, University of Texas at Dallas
Co-Principal investigator: Dr. Yiorgos Makris, University of Texas at Dallas
P12_22 Abstract
PI Email


P13_22: Scalable Security Verification Framework for Digital and Analog/Mixed-Signal System-on-Chips
Topic Areas: New Approaches to Secure On-Shore Microelectronics Design and Manufacturing
Principal investigator: Dr. Kanad Basu, University of Texas at Dallas
Co-Principal investigator: Dr. Yiorgos Makris, University of Texas at Dallas
P13_22 Abstract
PI Email


P14_22: Formal Security Evaluation of Executing Untrusted Binaries on Embedded Processors
Topic Areas: System-Level Security Solutions
Principal investigator: Dr. Kevin Hamlen, University of Texas at Dallas
Co-Principal investigator: Dr. Yiorgos Makris, University of Texas at Dallas
P14_22 Abstract
PI Email


P15_22: Design Obfuscation and Performance Locking Solutions for Analog/RF ICs
Topic Areas: Security and Trust Solutions for Analog/Mixed-Signal/RF Circuits
Principal investigator: Dr. Yiorgos Makris, University of Texas at Dallas
Co-Principal investigator(s): Dr. Ken O, Dr. Andrew Marshall, University of Texas at Dallas
P15_22 Abstract
PI Email


P16_22: CAD Flow Development for Design Obfuscation through Post-Fabrication Transistor-Level Programming (TRAP)
Topic Areas: IP Protection
Principal investigator: Dr. Yiorgos Makris, University of Texas at Dallas
Co-Principal investigator(s): Dr. Carl Sechen and Dr. Benjamin Carrion Schaefer, University of Texas at Dallas
P16_22 Abstract
PI Email


P17_22: Is ARM TrustZone Trustable?
Topic Areas: Security Attacks, Side-channel Attacks
Principal investigator: Dr. Yunsi Fei, Northeastern University
P17_22 Abstract
PI Email


P18_22: Evaluating the Potential for Fully Homomorphic Encryption on Accelerator Platforms
Topic Areas: Design
Principal investigator: Dr. David Kaeli, Northeastern University
P18_22 Abstract
PI Email


P19_22: Fingerprinting FPGA Circuits Using Communication Interfaces
Topic Areas: FPGA Integrity Monitoring and Risk Mitigation
Principal investigator: Dr. Houman Homayoun, University of California Davis
Co-Principal investigator(s): Dr. J. M. Emmert, University of Cincinnati
P19_22 Abstract
PI Email


P20_22: Translation of Learning models into Logic for Real-Time Hardware monitoring and Security
Principal investigator: Dr. Avesta Sasan Co-Principal investigator: Dr. Houman Homayoun, University of California Davis
P20_22 Abstract
PI Email


P21_22: Cloud-based collaborative platform for defect identification and simulation
Topic Areas: Reverse engineering, Counterfeit, overproduction, IP theft detection and deterrence
Principal investigator: Dr. Sina Shahbazmohamadi, University of Connecticut
Co-Principal investigator:Dr. Pouya Tavousi, University of Connecticut
P21_22 Abstract
PI Email


P22_22: Automated High-resolution Inspection and Reverse Engineering of Microelectronics Using Laser and Multimodality Microscopy
Topic Areas: Reverse engineering, Counterfeit, overproduction, IP theft detection and deterrence
Principal investigator: Dr. Sina Shahbazmohamadi, University of Connecticut
Co-Principal investigator:Dr. Pouya Tavousi, University of Connecticut
P22_22 Abstract
PI Email


Top