PORTALE DELLA DIDATTICA

Ricerca CERCA
  KEYWORD

Exploiting EDA environments for Red- and Blue-Teaming

Parole chiave ATALANTA ATPG, BLUE-TEAMING, CAPTURE-THE-FLAG COMPETITIONS, CYBER CHALLENGES, CYBERRANGES, EDA ENVIRONMENTS, GAMIFICATION, GAMING, HARDWARE SECURITY, HARDWARE TROJANS, RED-TEAMING, SECURITY, VALIDATION & VERIFICATION, YOSYS

Riferimenti PAOLO ERNESTO PRINETTO

Riferimenti esterni Gianluca ROASCIO (CINI Cybersecurity National Laboratory)
Nicoḷ MAUNERO (CINI Cybersecurity National Laboratory)
Gaspare FERRARO (CINI Cybersecurity National Laboratory)
Zainalabedin NAVABI (Faculty of Engineering of the University of Tehran)
Antonio VARRIALE (Blu5 Labs, Malta)

Gruppi di ricerca GR-21 - TESTGROUP - TESTGROUP

Tipo tesi MASTER THESIS

Descrizione Gaming and Gamification are getting an increasing usage in Security training and education.

In particular, Challenges and Capture-the-Flag are more and more exploited in both Read-Teaming and Blue-Teaming.

When dealing with Hardware security, very often we have to "reverse" a hardware design, starting from structural and/or behavioural descriptions at different abstraction levels.

The purpose of the thesis is to extensively exploit several EDA (Electronic Design Automation) environments, like Yosys and Atalanta, for (i) reversing and analysing digital circuits, (ii) detecting the presence of hardware Trojans.

The thesis activities will be carried out in collaboration with researchers of:
- CINI Cybersecurity National Laboratory (https://cybersecnatlab.it)
- Faculty of Engineering of the University of Tehran
- Blu5® Labs Ltd (Malta)

Note The thesis activities will be carried out in collaboration with researchers of:
- CINI Cybersecurity National Laboratory (https://cybersecnatlab.it)
- Faculty of Engineering of the University of Tehran
- Blu5® Labs Ltd (Malta)

The topic is so huge that several students can be involved in the activities.


Scadenza validita proposta 31/10/2023      PROPONI LA TUA CANDIDATURA