STEALTH - Secure and Trusted Analog Hardware Technology

Home » STEALTH - Secure and Trusted Analog Hardware Technology
Date: 
01/01/2017 to 31/12/2020

Project Description:

While extensive research efforts have been expended over the last decade in understanding trust and security threat scenarios in digital ICs, as well as in developing prevention, countermeasure, and detection solutions, the topic remains largely unexplored for their analog counterparts. Analog ICs are considered nowadays as the weakest link in warranting the global security policy for the entire electronic system. 

This project concerns hardware trust and security aspects specifically for analog integrated circuits (ICs). The project seeks to understand the vulnerability of analog ICs to security breaches, as well as to propose remedies and methodologies toward designing, fabricating, and deploying trusted and secure analog ICs.

More specifically, the project envisions developing a large portfolio of obfuscation methodologies for equipping analog ICs with a capability that prevents reverse engineering and counterfeiting.

The developed obfuscation methodologies will range from generic ones, which are virtually applicable to any circuit class, to circuit class-specific ones, which are applicable to all architectures within a specific circuit class. Comprehensive metrics will be developed to quantify the security protection level achieved, the intrusiveness into the design, the incurred area overhead, etc.

Week: 
Wednesday, 12 December, 2018

Future Events

The third Annual Fraud & Financial Crime Europe will focus on analysing the risks to determine the solutions in combating Fraud and Financial Crime.

01/09/2020 to 02/09/2020

Information security and privacy have already been established as some of the most crucial aspects of technology especially in a world that is migrating to digital applications by the day. This has inevitably led to the emergence of technologies that support the safety and dependability of the ever-increasing sensitive data handled by these applications. Additionally, besides these technologies which target security by their design, there are other technologies, such as machine learning, which could potentially be applied to security in innovative schemes. 

17/09/2020 to 18/09/2020