Secure, Trustworthy, and Reliable Systems
The continued scaling of silicon fabrication technology has led to significant reliability concerns, which are quickly becoming a dominant design challenge. Design integrity is threatened by complexity challenges in the form of immense designs defying complete verification, and physical challenges such as silicon aging and soft errors, which impair correct system operation, not to mention security side-channels that can be perpetrated by exploiting the hardware design. CSE researchers working in this space are addressing these key challenges through synergistic research vectors, which range from near-term reliability stress reduction techniques to improve the quality of today’s silicon, to longer-term technologies to detect, recover, and repair faulty systems.
Moreover, the ability to guarantee the functional correctness of digital integrated circuits and, in particular, complex microprocessors, is a key task in the production of secure and trusted systems. Unfortunately, this goal remains today an unfulfilled challenge, as evidenced by the long errata lists available for commercial microprocessors that list latent bugs not found during the design verification process. To address the challenges of verification, the faculty are turning toward the design of introspective systems capable of recognizing and correcting their errant ways. They are exploring and developing “patching” techniques that can repair these escaped bugs directly at the customer site, practically making hardware as malleable as software. In addition, they investigate low-cost techniques to validate computation at runtime, in particular techniques that are provably capable of preventing incorrect results.
The faculty working in this domain are also working on hardware security assurance solutions to protect computer systems against hardware and software attacks by means of hardware protection techniques. These efforts are supported and complemented by strong focus on functional verification methodologies. The overarching goal is to provide highly effective and low-cost solutions to ensure security, correctness and reliability in future designs, thereby extending the lifetime of silicon fabrication technologies.
From a software perspective, research at Michigan is focused both on identifying security and privacy vulnerabilities in existing systems and on developing solutions to address these threats. The need for systems that are provably secure and private by design is greater than ever before with the increasing use of online services and adoption of wearable healthcare devices/implants as well as the incentives for corporations and nation state attackers to compromise user privacy and security of electronic voting. Projects on these topics span embedded systems, mobile devices and apps, cyber-physical systems, social networks, and the web.
CSE Faculty
Todd Austin
WebsiteMentoring PlanComputer architecture, robust and secure system design, hardware and software verification, and performance analysis tools and techniques.Valeria Bertacco
WebsiteMentoring PlanImproving the functional correctness of digital integrated circuits, by developing technology that attacks the issue at design time, in post-silicon, and throughout the lifetime of a digital integrated component, in face of the challenges posed by fragile silicon and extreme design complexity.Peter Chen
WebsiteOperating systems, computer security, virtual machines, fault-tolerant computing.Mahdi Cheraghchi
WebsiteMentoring PlanAll theoretical aspects of CS, especially the role of information and coding theory in cryptography, complexity, algorithms, and high-dimensional geometry.Reetu Das
WebsiteMentoring PlanComputer architecture, and its interaction with software systems and device/VLSI technologies. Specialized interests include on-chip interconnection networks, three-dimensional IC design, and multi-core memory systems.Roya Ensafi
WebsiteMentoring PlanComputer and network security, surveillance and censorship measurement, privacy and tech policy.Paul Grubbs
WebsiteMentoring PlanApplied cryptography, computer security, privacy, systems security, and technology policy.Alex Halderman
WebsiteMentoring PlanComputer security, electronic voting, digital rights management, information privacy, and tech policy.Ryan Huang
WebsiteMentoring PlanOperating systems, distributed systems, cloud and mobile computing, software dependability, program analysis.Manos Kapritsos
WebsiteMentoring PlanDistributed systems, fault tolerance, formal verification, transaction processing.Yatin Manerkar
WebsiteMentoring PlanFormal methods (modeling, verification, and synthesis) for hardware and software, hardware security, memory consistency, cache coherence, concurrency, ethical AI.Morley Mao
WebsiteMentoring PlanMobile computing, security, networking, distributed systems, SDN, and cloud computing.Satish Narayanasamy
WebsiteMentoring PlanComputer Architecture; Program Analysis; Confidential Computing; Health SystemsChris Peikert
WebsiteMentoring PlanCryptography, lattices, coding theory, algorithms, and computational complexity. A particular focus is on cryptographic schemes whose security can be based on the apparent intractability of lattice problems.Atul Prakash
WebsiteMentoring PlanSecurity policy management, software infrastructure to support collaborative work, privacy in pervasive computing, intrusion detection, group security, operating system security, scientific collaboratories.Gokul Ravi
WebsiteMentoring PlanQuantum computing: Application-tailored full-stack optimization, Hardware-tailored error mitigation, Hybrid quantum-classical systems, Quantum error correction decoding, Classical simulation for quantum, Resource management (e.g., in the quantum cloud), Scalable quantum compilers; Computer architecture and systems; ML-assisted systems, Accelerating scientific applications.Karem Sakallah
WebsiteMentoring PlanComputer-aided design of electronic systems, Boolean satisfiability, discrete optimization, and hardware and software verification.Ke Sun
WebsiteMentoring PlanMobile computing, Human-computer interaction, embedded systems, and IoT security and privacy, with the vision of developing intelligent, cost-effective, deployable, human-centric, and trustworthy mobile, wearable, and IoT systems.Westley Weimer
WebsiteMentoring PlanProgramming languages; software engineering; medical imaging; program analysis, synthesis and improvement.ECE Faculty
Necmiye Ozay
WebsiteComputational aspects of control system design; hybrid and cyber-physical systems; safe autonomy; system identification and validation; dynamics-based data analysis.