KEYWORD |
Exploiting EDA environments for Red- and Blue-Teaming
Parole chiave ATALANTA ATPG, BLUE-TEAMING, CAPTURE-THE-FLAG COMPETITIONS, CYBER CHALLENGES, CYBERRANGES, EDA ENVIRONMENTS, GAMIFICATION, GAMING, HARDWARE SECURITY, HARDWARE TROJANS, RED-TEAMING, SECURITY, VALIDATION & VERIFICATION, YOSYS
Riferimenti PAOLO ERNESTO PRINETTO
Riferimenti esterni Gianluca ROASCIO (CINI Cybersecurity National Laboratory)
Nicoḷ MAUNERO (CINI Cybersecurity National Laboratory)
Gaspare FERRARO (CINI Cybersecurity National Laboratory)
Zainalabedin NAVABI (Faculty of Engineering of the University of Tehran)
Antonio VARRIALE (Blu5 Labs, Malta)
Gruppi di ricerca GR-21 - TESTGROUP - TESTGROUP
Tipo tesi MASTER THESIS
Descrizione Gaming and Gamification are getting an increasing usage in Security training and education.
In particular, Challenges and Capture-the-Flag are more and more exploited in both Read-Teaming and Blue-Teaming.
When dealing with Hardware security, very often we have to "reverse" a hardware design, starting from structural and/or behavioural descriptions at different abstraction levels.
The purpose of the thesis is to extensively exploit several EDA (Electronic Design Automation) environments, like Yosys and Atalanta, for (i) reversing and analysing digital circuits, (ii) detecting the presence of hardware Trojans.
The thesis activities will be carried out in collaboration with researchers of:
- CINI Cybersecurity National Laboratory (https://cybersecnatlab.it)
- Faculty of Engineering of the University of Tehran
- Blu5® Labs Ltd (Malta)
Note The thesis activities will be carried out in collaboration with researchers of:
- CINI Cybersecurity National Laboratory (https://cybersecnatlab.it)
- Faculty of Engineering of the University of Tehran
- Blu5® Labs Ltd (Malta)
The topic is so huge that several students can be involved in the activities.
Scadenza validita proposta 31/10/2023
PROPONI LA TUA CANDIDATURA