Home > Research > Research Areas > Secure, Trustworthy, & Reliable Systems

Secure, Trustworthy, and Reliable Systems

The continued scaling of silicon fabrication technology has led to significant reliability concerns, which are quickly becoming a dominant design challenge. Design integrity is threatened by complexity challenges in the form of immense designs defying complete verification, and physical challenges such as silicon aging and soft errors, which impair correct system operation, not to mention security side-channels that can be perpetrated by exploiting the hardware design. CSE researchers working in this space are addressing these key challenges through synergistic research vectors, which range from near-term reliability stress reduction techniques to improve the quality of today’s silicon, to longer-term technologies to detect, recover, and repair faulty systems.

Moreover, the ability to guarantee the functional correctness of digital integrated circuits and, in particular, complex microprocessors, is a key task in the production of secure and trusted systems. Unfortunately, this goal remains today an unfulfilled challenge, as evidenced by the long errata lists available for commercial microprocessors that list latent bugs not found during the design verification process. To address the challenges of verification, the faculty are turning toward the design of introspective systems capable of recognizing and correcting their errant ways. They are exploring and developing “patching” techniques that can repair these escaped bugs directly at the customer site, practically making hardware as malleable as software. In addition, they investigate low-cost techniques to validate computation at runtime, in particular techniques that are provably capable of preventing incorrect results.

The faculty working in this domain are also working on hardware security assurance solutions to protect computer systems against hardware and software attacks by means of hardware protection techniques. These efforts are supported and complemented by strong focus on functional verification methodologies. The overarching goal is to provide highly effective and low-cost solutions to ensure security, correctness and reliability in future designs, thereby extending the lifetime of silicon fabrication technologies.

From a software perspective, research at Michigan is focused both on identifying security and privacy vulnerabilities in existing systems and on developing solutions to address these threats. The need for systems that are provably secure and private by design is greater than ever before with the increasing use of online services and adoption of wearable healthcare devices/implants as well as the incentives for corporations and nation state attackers to compromise user privacy and security of electronic voting. Projects on these topics span embedded systems, mobile devices and apps, cyber-physical systems, social networks, and the web. 

CSE Faculty

Todd Austin

WebsiteMentoring PlanComputer architecture, robust and secure system design, hardware and software verification, and performance analysis tools and techniques.

Valeria Bertacco

WebsiteMentoring PlanImproving the functional correctness of digital integrated circuits, by developing technology that attacks the issue at design time, in post-silicon, and throughout the lifetime of a digital integrated component, in face of the challenges posed by fragile silicon and extreme design complexity.

Ang Chen

WebsiteMentoring PlanSystems, networking, security.

Peter Chen

WebsiteOperating systems, computer security, virtual machines, fault-tolerant computing.

Mahdi Cheraghchi

WebsiteMentoring PlanAll theoretical aspects of CS, especially the role of information and coding theory in cryptography, complexity, algorithms, and high-dimensional geometry.

Reetu Das

WebsiteMentoring PlanComputer architecture, and its interaction with software systems and device/VLSI technologies. Specialized interests include on-chip interconnection networks, three-dimensional IC design, and multi-core memory systems.

Roya Ensafi

WebsiteMentoring PlanComputer and network security, surveillance and censorship measurement, privacy and tech policy.

Paul Grubbs

WebsiteMentoring PlanApplied cryptography, computer security, privacy, systems security, and technology policy.

Alex Halderman

WebsiteMentoring PlanComputer security, electronic voting, digital rights management, information privacy, and tech policy.

Ryan Huang

WebsiteMentoring PlanOperating systems, distributed systems, cloud and mobile computing, software dependability, program analysis.

Manos Kapritsos

WebsiteMentoring PlanDistributed systems, fault tolerance, formal verification, transaction processing.

Yatin Manerkar

WebsiteMentoring PlanFormal methods (modeling, verification, and synthesis) for hardware and software, hardware security, memory consistency, cache coherence, concurrency, ethical AI.

Morley Mao

WebsiteMentoring PlanMobile computing, security, networking, distributed systems, SDN, and cloud computing.

Satish Narayanasamy

WebsiteMentoring PlanComputer Architecture; Program Analysis; Confidential Computing; Health Systems

Chris Peikert audio icon

WebsiteMentoring PlanCryptography, lattices, coding theory, algorithms, and computational complexity. A particular focus is on cryptographic schemes whose security can be based on the apparent intractability of lattice problems.

Atul Prakash

WebsiteMentoring PlanSecurity policy management, software infrastructure to support collaborative work, privacy in pervasive computing, intrusion detection, group security, operating system security, scientific collaboratories.

Gokul Ravi

WebsiteMentoring PlanQuantum computing: Application-tailored full-stack optimization, Hardware-tailored error mitigation, Hybrid quantum-classical systems, Quantum error correction decoding, Classical simulation for quantum, Resource management (e.g., in the quantum cloud), Scalable quantum compilers; Computer architecture and systems; ML-assisted systems, Accelerating scientific applications.

Amrita Roy Chowdhury

WebsiteMentoring PlanCryptography, Differential Privacy, Machine Learning

Karem Sakallah

WebsiteMentoring PlanComputer-aided design of electronic systems, Boolean satisfiability, discrete optimization, and hardware and software verification.

Ke Sun

WebsiteMentoring PlanMobile computing, Human-computer interaction, embedded systems, and IoT security and privacy, with the vision of developing intelligent, cost-effective, deployable, human-centric, and trustworthy mobile, wearable, and IoT systems.

Westley Weimer

WebsiteMentoring PlanProgramming languages; software engineering; medical imaging; program analysis, synthesis and improvement.

ECE Faculty

Necmiye Ozay

WebsiteComputational aspects of control system design; hybrid and cyber-physical systems; safe autonomy; system identification and validation; dynamics-based data analysis.