About Our Research
Proin finibus libero vel tellus mattis, ac mattis ante pulvinar. Maecenas venenatis semper ligula, et vehicula odio fermentum a. Aliquam tristique venenatis tellus, tempor lacinia libero dapibus vitae. Etiam commodo dictum eros, eu pellentesque purus ullamcorper non. Curabitur non molestie erat, sed pellentesque lacus. In maximus luctus lacus, ut imperdiet purus consequat sed. Nulla facilisi.
Ongoing Research
Secure Hardware Verification

- Supervisor(s): Leonid Azriel
- Research document
- Status: available
The question is whether specific methods from the software domain can be used in hardware security analysis. One software verification paradigm that might work for hardware is taint analysis, which is known in the hardware world as information flow tracking. Such analysis may use graph methods to track the information flow between different security domains. Early methods are limited to a small scale, due to the required intimate knowledge of every design detail and intrinsic algorithm limitations.
Two topics are suggested for the research:
- Using Graph Neural Networks (GNN) to detect security vulnerabilities
- Using Quantitative Information Flow (QIF) for secure hardware verification