Workshop on Trustworthy Hardware


Hardware security and trustworthy hardware are on the brink of a revolution and this workshop and the resulting special issue/book seek to showcase the latest advances in state-of-the-art trustworthy hardware and identify the most promising research frontiers in IC and system security. The scope of this workshop spans critical aspects of IC and system security ranging from theoretical and conceptual foundations, synthesis, testing and verification, to modeling and optimization to case studies. From a platforms perspective this workshop/special issue will cover IC and system security and trust issues in ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. Other topics of interest include: Hardware security primitives (circuitry and mechanisms) including IDs, PUFs, PPUFs, public TRNGs, side channels, dual rail logic, controlled aging, IC conditioning, watermarking, fingerprinting, and obfuscation; Hardware-based security protocols including DRM (IC metering, enabling and disabling), trust guarantees, authentication, privacy, hardware-based PKC; Hardware attacks: creation, detection, characterization, and compensation; Forensic and reverse engineering (e.g. process, IC, models, algorithms); Computer aided design (CAD) techniques for IC and System Security; Trusted synthesis and compilation using untrustworthy CAD tools; Trusted hardware based system security; Impact of nano and other emerging technologies on hardware-based system security; Hardware-supported primitives and protocols for operating systems and utility software.

Goal : This workshop will identify important topics in hardware trust that are relevant to industry and DoD.



  • Ramesh Karri, Professor of Electrical and Computer Engineering, NYU- Tandon School of Engineering 
  • Mihalis Maniatakos, Assistant Professor of Electrical and Computer Engineering, NYU Abu Dhabi
  • Cliff Wang (Army Research Office)
  • Jeyavijayan (JV) RajendranNYU- Tandon School of Engineering