Secure, Trustworthy, and Reliable Systems

Secure, Trustworthy, and Reliable Systems photo
The continued scaling of silicon fabrication technology has led to significant reliability concerns, which are quickly becoming a dominant design challenge. Design integrity is threatened by complexity challenges in the form of immense designs defying complete verification, and physical challenges such as silicon aging and soft errors, which impair correct system operation, not to mention security side-channels that can be perpetrated by exploiting the hardware design. CSE researchers working in this space are addressing these key challenges through synergistic research vectors, which range from near-term reliability stress reduction techniques to improve the quality of today’s silicon, to longer-term technologies to detect, recover, and repair faulty systems.

Moreover, the ability to guarantee the functional correctness of digital integrated circuits and, in particular, complex microprocessors, is a key task in the production of secure and trusted systems. Unfortunately, this goal remains today an unfulfilled challenge, as evidenced by the long errata lists available for commercial microprocessors that list latent bugs not found during the design verification process. To address the challenges of verification, the faculty are turning toward the design of introspective systems capable of recognizing and correcting their errant ways. They are exploring and developing “patching” techniques that can repair these escaped bugs directly at the customer site, practically making hardware as malleable as software. In addition, they investigate low-cost techniques to validate computation at runtime, in particular techniques that are provably capable of preventing incorrect results.

The faculty working in this domain are also working on hardware security assurance solutions to protect computer systems against hardware and software attacks by means of hardware protection techniques. These efforts are supported and complemented by strong focus on functional verification methodologies. The overarching goal is to provide highly effective and low-cost solutions to ensure security, correctness and reliability in future designs, thereby extending the lifetime of silicon fabrication technologies.

From a software perspective, research at Michigan is focused both on identifying security and privacy vulnerabilities in existing systems and on developing solutions to address these threats. The need for systems that are provably secure and private by design is greater than ever before with the increasing use of online services and adoption of wearable healthcare devices/implants as well as the incentives for corporations and nation state attackers to compromise user privacy and security of electronic voting. Projects on these topics span embedded systems, mobile devices and apps, cyber-physical systems, social networks, and the web.

Related Links

Security and Privacy Research Group
Systems Lab
Theory of Computation Lab

CSE Faculty

Austin, Todd
Bertacco, Valeria
Chen, Peter M.
Cheraghchi, Mahdi
Das, Reetuparna
Ensafi, Roya
Grubbs, Paul
Halderman, J. Alex
Huang, Ryan
Kapritsos, Manos
Kasikci, Baris
Manerkar, Yatin
Mao, Zhuoqing Morley
Mudge, Trevor
Narayanasamy, Satish
Noble, Brian
Peikert, Christopher
Prakash, Atul
Sakallah, Karem A.
Weimer, Westley

ECE Faculty

Austin, Todd
Mudge, Trevor
Ozay, Necmiye
Sakallah, Karem A.