Content

Partly because of design outsourcing and migration of fabrication to low-cost areas across the globe, and partly because of increased reliance on third-party intellectual property and design automation software, the integrated circuit supply chain is now considered far more vulnerable to malicious modifications than ever before.

The increasing complexity of networked computing systems makes modern network systems vulnerable to various attacks against their resources, infrastructure, and operability. While the reasons for such attacks may be tied to complex sociological issues, the cause of our inadequate defense solutions lies in the single-layered approach used to address computer systems security. Current security approaches separate defense strategies into distinct realms, either hardware or software. Accordingly, cross-layer approaches for secure computing and circuit systems are entirely lacking. In addition, the wide usage of third-party IP cores and outsourcing fabrication/packaging services make it possible for malicious hardware modules to enter the design flow and, therefore, complicates the problem of trusted system design and verification. The Security in Silicon Lab (SSL) focuses on these areas and tries to develop solutions address IP core security, cross-layer protection, smart device security, and AI security.



1. Emerging Devices for Security

2. Layout-Netlist Obfuscation

3. Netlist Reverse Engineering

4. RTL Formal Verification

5. Analog Security in Digital Domain

6. Architectural Security

7. Internet of Things Security

8. Autonomous Vehicle Security

9. Artificial Intelligence Security