Take the Next Step
Finding the right college means finding the right fit. See all that the College of Engineering and Computer Science has to offer by visiting campus.
On this page:
Research Experience Dates: June 1—August 10, 2025
Topic: Cybersecurity in Trusted Microelectronics: Addressing Challenges in Hardware Security and Resilient Supply Chains
The summer Research Experiences for Undergraduates (REU) program, funded by the NSF Division of Computer and Network Systems, focuses on Training Research for Undergraduate Students in Secure and Trusted Systems (TRUST). It emphasizes hardware security in areas such as the Internet of Things (IoT), embedded AI security, detection and mitigation of side-channel attacks, and the security and trust of firmware and embedded systems.
Deadline: March 1, 2025
Announcement of Awards: April 1, 2025
On-campus housing will be coordinated and provided for REU participants for 10 weeks. The rooms are furnished with a twin-sized bed, desk, and chair. The desk will be open 24 hours, and the participants may pick up their keys. For more housing information, please visit the Wright State Residence Life and Housing website.
All REU students will work at the Wright State University College of Engineering and Computer Science and Air Force Institute of Technology Lab.
RTA buses run from downtown Dayton to Wright State and from downtown to many other destinations. RTA transportation passes and schedules are available at the Wright State University Campus Store, 182 Student Union. The RTA’s phone number is 937-425-8300. All buses feature bike racks and meet ADA accessibility guidelines.
Greene CATS Public Transit’s services are open to the general public and meet ADA accessibility guidelines.
They provide two types of Demand Responsive service:
The project will be carried out by a team of PIs/Co-PIs with complementary expertise in cybersecurity and education.
Dr. Amsaad specializes in digital microelectronics and leads the $29.75M AFRL effort, namely the Assured Digital Microelectronics Education and Training Ecosystem (ADMETE), National Pathway to Success in Cybersecurity (NPS), and the $1.036M grant supported by the NSA.
Dr. Hopkinson is a Professor of Computer Science and Department Head of Electrical and Computer Engineering at the Air Force Institute of Technology (AFIT) in Dayton, Ohio. He is a Senior Member of the IEEE and ACM professional societies. Proficient in Networking, Security, Cryptography, Remote Sensing, Sensor Fusion, Critical Infrastructure Protection, and Space Applications, he has made significant research contributions that enhance our national security and technological advancements.
Dr. Zhang is an Associate Professor in Wright State University’s Computer Science department and also directs the Cybersecurity Programs within the CSE Department. His extensive research is centered on secure and trusted communication systems, with a strong focus on developing trusted and secure systems. Dr. Zhang’s cybersecurity research has received support from federal, state, and industrial grants. Committed to advancing cybersecurity education, he has led significant initiatives, including serving as the Principal Investigator for the “REU Site: Cyber Security Research at Wright State University” project (CNS-1560315, 2016-2019). This initiative empowered undergraduate students to engage in independent research in cybersecurity, contributing to the progression of trusted and secure systems in the field.
Dr. Zhang is an Assistant Professor in Wright State University’s Computer Science department, who specializes in AI-assisted techniques for developing efficient, secure, and trusted IoT applications. Her research encompasses projects in the Authentication of Multi-Hop Routing and Energy Allocation in Distributed IoT Systems based on Multi-agent RL, Sparsity-Aware Spatiotemporal Data Reconstruction Framework for Self-Secure and Trusted AIoT Systems. Dr. Zhang’s work also includes the joint optimization of Node Placement and UAV’s Trajectory for Efficient, Self-Secure, and Trusted Air-Ground IoT Systems, demonstrating her commitment to advancing the field of Secure and Trusted IoT systems.
Tamzidul Hoque is an Assistant Professor in Kansas University’s Electrical and Computer Engineering department, specializes in hardware security, and leads two NSF projects focusing on hardware education and microelectronic security education in NSF IUSE and NSF SaTC, respectively. He secured funding from NSF, NSA, and industry with more than half a million.
Dr. Chen is an Assistant Professor at Wright State and specializes in machine learning and security. His research focuses on developing machine learning algorithms for security challenges and enhancing trust in intelligent systems. Dr. Chen’s work has been published in prestigious venues, including SIGIR, AAAI, and IJCAI, and he holds an NSF CRII award (Grant #NSF CNS-2245968) for data-effective security attack detection. He has extensive teaching experience in machine learning and cybersecurity, mentoring students at various levels, including REU participants and high school students in computer science.
This project equips students with comprehensive knowledge and hands-on experience in hardware security by focusing on both the creation and detection of hardware Trojans in AI accelerators.
Part 1: Trojan Design
Students will learn about the design principles of hardware Trojans, covering different abstraction levels such as gate level, RTL, and layout. They will design a simple Trojan circuit within an AI accelerator comprising a trigger and payload and observe its effect on system behavior. Using the provided HDL code, students modify the accelerator to insert the Trojan. After synthesizing the modified design onto an FPGA, they will analyze how the Trojan disrupts clock behavior during image processing, potentially leading to misclassifications.
Part 2: Trojan Detection
Students will explore side-channel analysis as a method to detect hardware Trojans. By collecting power signatures from a suspected Trojan-infected chip and comparing them to a Trojan-free reference design, students will apply machine learning-based tools to detect discrepancies in power usage. The project aims to give students hands-on experience with Trojan design, side-channel analysis, data collection, and hardware security.
This project gives students practical insights into executing power side-channel attacks on AI hardware and designing countermeasures to protect against these vulnerabilities.
Part 1: Power Side-Channel Attacks
Students will implement power side-channel attacks on a CNN accelerator running on an FPGA. They will analyze power consumption patterns using an oscilloscope to identify foreground and background image components during inference. Through voltage trace analysis, students will learn to separate these components based on power usage. They will also apply noise reduction techniques to improve data accuracy and extract image details from background pixels.
Part 2: Countermeasures Against Side-Channel Attacks
This phase teaches students how to design and implement protective strategies against side-channel attacks. They will partition the hardware design and create obfuscated variants to mask timing information and randomize execution paths. By generating FPGA bitstreams and collecting timing data, students will assess the effectiveness of these hardware countermeasures in defending against timing-based side-channel attacks.
This project introduces students to the security challenges and solutions in modern embedded systems. The focus is on hardware testing, verification, FPGA programming, and compiler integration.
Hardware Testing and Verification
Students will collaborate with the Air Force Institute of Technology (AFIT) to test and verify modules for a RISC-V embedded processor. This involves developing test software and firmware to validate processor modules and prevent errors.
Trusted Hardware Platforms on FPGA
Students will gain hands-on experience in programming Field Programmable Gate Arrays (FPGAs) using Hardware Description Languages (HDL) like VHDL. They will develop and test trusted hardware platforms, focusing on ensuring security in embedded systems.
Trusted Microprocessor Integration
Students will assist in integrating a trusted microprocessor into the LLVM compiler suite in collaboration with the Air Force Research Laboratory (AFRL). They will work on low-level assembly programming and optimize hardware instructions, ensuring their proper execution in a processor emulator. This task provides insights into compiler optimization, hardware security, and embedded system development.
Wright State University (WSU) is proud to announce the recipients of the Research Experiences for Undergraduates (REU) awards for the summer of 2024. This program, funded by the NSF Division of Computer and Network Systems, focuses on Training Research for Undergraduate Students in Secure and Trusted Systems (TRUST). WSU is committed to fostering an inclusive environment and does not discriminate against students, employees, or applicants for admission or employment on the basis of race, color, religion, creed, national origin, sex, sexual orientation, gender identity/expression, disability, age, status as a protected veteran, genetic information, or any other legally protected class with respect to all employment, programs, and activities sponsored by WSU. For inquiries regarding non-discrimination policies, please contact: Office of Diversity and Affirmative Action P: 937.775.2111 The WSU policy on nondiscrimination can be found at https://policy.wright.edu/policy/1280-non-discrimination
Please email the following additional information to Dr. Amsaad at fathi.amsaad@wright.edu:
Finding the right college means finding the right fit. See all that the College of Engineering and Computer Science has to offer by visiting campus.