Research

2025 NSF Research Experiences for Undergraduates (REU)

On this page:

 

Dates and Topic

Research Experience Dates: June 1—August 10, 2025
Topic: Cybersecurity in Trusted Microelectronics: Addressing Challenges in Hardware Security and Resilient Supply Chains
 



Program Overview

Secure and Trusted Systems

The summer Research Experiences for Undergraduates (REU) program, funded by the NSF Division of Computer and Network Systems, focuses on Training Research for Undergraduate Students in Secure and Trusted Systems (TRUST). It emphasizes hardware security in areas such as the Internet of Things (IoT), embedded AI security, detection and mitigation of side-channel attacks, and the security and trust of firmware and embedded systems.

Project Objectives

  • Engage in trusted microelectronics research to gain practical experience in areas critical to national.
  • Facilitate self-assessment for interns regarding their interests in cybersecurity and potential graduate studies.
  • Acquire advanced knowledge in hardware security, encompassing hardware, software, IoT, communications, and machine/deep learning security.

Activities

  • Hands-on FPGA development and simulation of CNN accelerators
  • Data analysis of voltage traces captured during inference.
  • Application of noise reduction techniques for accurate data interpretation.
  • Exploration and implementation of countermeasures against hardware side-channel attacks.
  • Design partitioning and hardware integration for enhanced security measures.

Topic Areas

  • Hardware Security in Trusted System
  • Side-Channel Attack and Countermeasures
  • AI Hardware Security and Firmware Protection
  • Embedded System Security in IoT Applications
  • Research Collaboration in Secure Microelectronics Development

Award Information

  • $6,500 stipend for 10 weeks
  • On-campus housing included
  • Food allowance
  • Round-trip travel expenses up to $600 ➢ The total is approximately $9,000
     


Application Information

Deadline: March 1, 2025
Announcement of Awards: April 1, 2025

Eligibility Requirements

  • U.S. citizen or permanent resident
  • Electrical engineering, computer/software engineering, computer Science, or any other related disciplines with a 3.0 or higher GPA
  • Sophomore, junior, or senior
  • Must graduate after September 2025

 


Housing & Transportation

Housing

On-campus housing will be coordinated and provided for REU participants for 10 weeks. The rooms are furnished with a twin-sized bed, desk, and chair. The desk will be open 24 hours, and the participants may pick up their keys. For more housing information, please visit the Wright State Residence Life and Housing website.

Work Site

All REU students will work at the Wright State University College of Engineering and Computer Science and Air Force Institute of Technology Lab.

Transportation

RTA buses run from downtown Dayton to Wright State and from downtown to many other destinations. RTA transportation passes and schedules are available at the Wright State University Campus Store, 182 Student Union. The RTA’s phone number is 937-425-8300. All buses feature bike racks and meet ADA accessibility guidelines.

Greene CATS Public Transit’s services are open to the general public and meet ADA accessibility guidelines.

They provide two types of Demand Responsive service:

  1. Scheduled Rides pick up and drop off riders at any location within Greene County with limited service to neighboring counties;
  2. Flex Routes have defined routes with scheduled time points that circulate and link Greene County communities of Beavercreek, Fairborn, Xenia, and Yellow Springs. Deviations on Flex Routes up to 1/2 of a mile are available upon request. The Wright State University’s time point is located along the Orange Line flex route and is at the Student Union (shared bus stop with Greater Dayton RTA and the Raider Shuttle). Flex Route buses are also equipped with bike racks.
     


Faculty

The project will be carried out by a team of PIs/Co-PIs with complementary expertise in cybersecurity and education.

Fathi Amsaad, Ph.D.

Principal Investigator

Dr. Amsaad specializes in digital microelectronics and leads the $29.75M AFRL effort, namely the Assured Digital Microelectronics Education and Training Ecosystem (ADMETE), National Pathway to Success in Cybersecurity (NPS), and the $1.036M grant supported by the NSA.

Kenneth Hopkinson, Ph.D.

Co-Principal Investigator

Dr. Hopkinson is a Professor of Computer Science and Department Head of Electrical and Computer Engineering at the Air Force Institute of Technology (AFIT) in Dayton, Ohio. He is a Senior Member of the IEEE and ACM professional societies. Proficient in Networking, Security, Cryptography, Remote Sensing, Sensor Fusion, Critical Infrastructure Protection, and Space Applications, he has made significant research contributions that enhance our national security and technological advancements.

Junjie Zhang, Ph.D.

Senior Personnel

Dr. Zhang is an Associate Professor in Wright State University’s Computer Science department and also directs the Cybersecurity Programs within the CSE Department. His extensive research is centered on secure and trusted communication systems, with a strong focus on developing trusted and secure systems. Dr. Zhang’s cybersecurity research has received support from federal, state, and industrial grants. Committed to advancing cybersecurity education, he has led significant initiatives, including serving as the Principal Investigator for the “REU Site: Cyber Security Research at Wright State University” project (CNS-1560315, 2016-2019). This initiative empowered undergraduate students to engage in independent research in cybersecurity, contributing to the progression of trusted and secure systems in the field.

Wen Zhang, Ph.D.

Senior Personnel

Dr. Zhang is an Assistant Professor in Wright State University’s Computer Science department, who specializes in AI-assisted techniques for developing efficient, secure, and trusted IoT applications. Her research encompasses projects in the Authentication of Multi-Hop Routing and Energy Allocation in Distributed IoT Systems based on Multi-agent RL, Sparsity-Aware Spatiotemporal Data Reconstruction Framework for Self-Secure and Trusted AIoT Systems. Dr. Zhang’s work also includes the joint optimization of Node Placement and UAV’s Trajectory for Efficient, Self-Secure, and Trusted Air-Ground IoT Systems, demonstrating her commitment to advancing the field of Secure and Trusted IoT systems.

Tamzidul Hoque

Senior Personnel

Tamzidul Hoque is an Assistant Professor in Kansas University’s Electrical and Computer Engineering department, specializes in hardware security, and leads two NSF projects focusing on hardware education and microelectronic security education in NSF IUSE and NSF SaTC, respectively. He secured funding from NSF, NSA, and industry with more than half a million.

Lingwei Chen, Ph.D.

Senior Personnel

Dr. Chen is an Assistant Professor at Wright State and specializes in machine learning and security. His research focuses on developing machine learning algorithms for security challenges and enhancing trust in intelligent systems. Dr. Chen’s work has been published in prestigious venues, including SIGIR, AAAI, and IJCAI, and he holds an NSF CRII award (Grant #NSF CNS-2245968) for data-effective security attack detection. He has extensive teaching experience in machine learning and cybersecurity, mentoring students at various levels, including REU participants and high school students in computer science.


 


Projects

AI Hardware Trojan Design and Detection

This project equips students with comprehensive knowledge and hands-on experience in hardware security by focusing on both the creation and detection of hardware Trojans in AI accelerators.

Part 1: Trojan Design
Students will learn about the design principles of hardware Trojans, covering different abstraction levels such as gate level, RTL, and layout. They will design a simple Trojan circuit within an AI accelerator comprising a trigger and payload and observe its effect on system behavior. Using the provided HDL code, students modify the accelerator to insert the Trojan. After synthesizing the modified design onto an FPGA, they will analyze how the Trojan disrupts clock behavior during image processing, potentially leading to misclassifications.

Part 2: Trojan Detection
Students will explore side-channel analysis as a method to detect hardware Trojans. By collecting power signatures from a suspected Trojan-infected chip and comparing them to a Trojan-free reference design, students will apply machine learning-based tools to detect discrepancies in power usage. The project aims to give students hands-on experience with Trojan design, side-channel analysis, data collection, and hardware security.


Power Side-Channel Hardware Attacks and Countermeasures

This project gives students practical insights into executing power side-channel attacks on AI hardware and designing countermeasures to protect against these vulnerabilities.

Part 1: Power Side-Channel Attacks
Students will implement power side-channel attacks on a CNN accelerator running on an FPGA. They will analyze power consumption patterns using an oscilloscope to identify foreground and background image components during inference. Through voltage trace analysis, students will learn to separate these components based on power usage. They will also apply noise reduction techniques to improve data accuracy and extract image details from background pixels.

Part 2: Countermeasures Against Side-Channel Attacks
This phase teaches students how to design and implement protective strategies against side-channel attacks. They will partition the hardware design and create obfuscated variants to mask timing information and randomize execution paths. By generating FPGA bitstreams and collecting timing data, students will assess the effectiveness of these hardware countermeasures in defending against timing-based side-channel attacks.


Embedded System Security

This project introduces students to the security challenges and solutions in modern embedded systems. The focus is on hardware testing, verification, FPGA programming, and compiler integration.

Hardware Testing and Verification
Students will collaborate with the Air Force Institute of Technology (AFIT) to test and verify modules for a RISC-V embedded processor. This involves developing test software and firmware to validate processor modules and prevent errors.

Trusted Hardware Platforms on FPGA
Students will gain hands-on experience in programming Field Programmable Gate Arrays (FPGAs) using Hardware Description Languages (HDL) like VHDL. They will develop and test trusted hardware platforms, focusing on ensuring security in embedded systems.

Trusted Microprocessor Integration
Students will assist in integrating a trusted microprocessor into the LLVM compiler suite in collaboration with the Air Force Research Laboratory (AFRL). They will work on low-level assembly programming and optimize hardware instructions, ensuring their proper execution in a processor emulator. This task provides insights into compiler optimization, hardware security, and embedded system development.
 



Application

Wright State University (WSU) is proud to announce the recipients of the Research Experiences for Undergraduates (REU) awards for the summer of 2024. This program, funded by the NSF Division of Computer and Network Systems, focuses on Training Research for Undergraduate Students in Secure and Trusted Systems (TRUST). WSU is committed to fostering an inclusive environment and does not discriminate against students, employees, or applicants for admission or employment on the basis of race, color, religion, creed, national origin, sex, sexual orientation, gender identity/expression, disability, age, status as a protected veteran, genetic information, or any other legally protected class with respect to all employment, programs, and activities sponsored by WSU. For inquiries regarding non-discrimination policies, please contact: Office of Diversity and Affirmative Action P: 937.775.2111 The WSU policy on nondiscrimination can be found at https://policy.wright.edu/policy/1280-non-discrimination

Please email the following additional information to Dr. Amsaad at fathi.amsaad@wright.edu:

  • Copies of all college transcripts (unofficial transcripts are acceptable).
  • A one-page (maximum) personal statement describing your interest in the program and how your participation will help advance career goals.
  • Resume
(Students graduating prior to September 2025 are not eligible to participate.)

List the two people you have asked to provide a letter of recommendation. One reference must be from a faculty member. The PDF recommendation letter must be emailed by the referee to the email address at the top of this page.

Reference 1
Reference 2

Take the Next Step

Finding the right college means finding the right fit. See all that the College of Engineering and Computer Science has to offer by visiting campus.