KEYWORD |
Exploiting EDA environments for Red- and Blue-Teaming
keywords ATALANTA ATPG, BLUE-TEAMING, CAPTURE-THE-FLAG COMPETITIONS, CYBER CHALLENGES, CYBERRANGES, EDA ENVIRONMENTS, GAMIFICATION, GAMING, HARDWARE SECURITY, HARDWARE TROJANS, RED-TEAMING, SECURITY, VALIDATION & VERIFICATION, YOSYS
Reference persons PAOLO ERNESTO PRINETTO
External reference persons Gianluca ROASCIO (CINI Cybersecurity National Laboratory)
Nicoḷ MAUNERO (CINI Cybersecurity National Laboratory)
Gaspare FERRARO (CINI Cybersecurity National Laboratory)
Zainalabedin NAVABI (Faculty of Engineering of the University of Tehran)
Antonio VARRIALE (Blu5 Labs, Malta)
Research Groups GR-21 - TESTGROUP - TESTGROUP
Thesis type MASTER THESIS
Description Gaming and Gamification are getting an increasing usage in Security training and education.
In particular, Challenges and Capture-the-Flag are more and more exploited in both Read-Teaming and Blue-Teaming.
When dealing with Hardware security, very often we have to "reverse" a hardware design, starting from structural and/or behavioural descriptions at different abstraction levels.
The purpose of the thesis is to extensively exploit several EDA (Electronic Design Automation) environments, like Yosys and Atalanta, for (i) reversing and analysing digital circuits, (ii) detecting the presence of hardware Trojans.
The thesis activities will be carried out in collaboration with researchers of:
- CINI Cybersecurity National Laboratory (https://cybersecnatlab.it)
- Faculty of Engineering of the University of Tehran
- Blu5® Labs Ltd (Malta)
Notes The thesis activities will be carried out in collaboration with researchers of:
- CINI Cybersecurity National Laboratory (https://cybersecnatlab.it)
- Faculty of Engineering of the University of Tehran
- Blu5® Labs Ltd (Malta)
The topic is so huge that several students can be involved in the activities.
Deadline 31/10/2023
PROPONI LA TUA CANDIDATURA