About Our Research
Praesent quis arcu porttitor, ullamcorper quam sit amet, efficitur ligula. Nullam gravida imperdiet metus sed consequat. Maecenas porta purus et pellentesque sollicitudin. Donec pellentesque risus vitae suscipit imperdiet. Donec ex enim, tincidunt id velit non, scelerisque cursus enim. Proin aliquet bibendum odio, vel efficitur lacus iaculis eget. Integer mattis pharetra elementum. Duis laoreet tempus iaculis. Nunc placerat pretium porta.
Ongoing Research
Secure Hardware Verification

- Supervisor(s): Leonid Azriel
- Research document
- Status: available
The question is whether specific methods from the software domain can be used in hardware security analysis. One software verification paradigm that might work for hardware is taint analysis, which is known in the hardware world as information flow tracking. Such analysis may use graph methods to track the information flow between different security domains. Early methods are limited to a small scale, due to the required intimate knowledge of every design detail and intrinsic algorithm limitations.
Two topics are suggested for the research:
- Using Graph Neural Networks (GNN) to detect security vulnerabilities
- Using Quantitative Information Flow (QIF) for secure hardware verification