Project Abstract:
As a worldwide shift is occurring in were integrated circuits are both designed and manufactured, both the military and the commercial sector are concerned about whether electronic devices and systems can be trusted. Counterfeit electronic components are rampant in the microelectronics supply chain and those responsible for procuring and maintain cyber, military, financial, and other critical systems are extremely concerned about insertion of hardware and software Trojans into components and systems. This project will focus on hardware security, specifically on identifying methods that can be used to introduce Trojans into the electronics hardware, on methods for guaranteeing these Trojans can be detected and removed, and on methods for detecting counterfeit electronic components and devices. Trojans that reside at the hardware or software interface will also be considered. Though the public sector is just becoming aware of the vulnerability that Trojan and counterfeit electronics have on electronic systems, this is already a multi-billion dollar business with long-term career and entrepreneurial opportunities for those that can reduce the risk for the catastrophic consequences that can occur if trust in the electronics supply chain is compromised.
As a worldwide shift is occurring in were integrated circuits are both designed and manufactured, both the military and the commercial sector are concerned about whether electronic devices and systems can be trusted. Counterfeit electronic components are rampant in the microelectronics supply chain and those responsible for procuring and maintain cyber, military, financial, and other critical systems are extremely concerned about insertion of hardware and software Trojans into components and systems. This project will focus on hardware security, specifically on identifying methods that can be used to introduce Trojans into the electronics hardware, on methods for guaranteeing these Trojans can be detected and removed, and on methods for detecting counterfeit electronic components and devices. Trojans that reside at the hardware or software interface will also be considered. Though the public sector is just becoming aware of the vulnerability that Trojan and counterfeit electronics have on electronic systems, this is already a multi-billion dollar business with long-term career and entrepreneurial opportunities for those that can reduce the risk for the catastrophic consequences that can occur if trust in the electronics supply chain is compromised.