DRAFT: This module has unpublished changes.
User-uploaded Content
DRAFT: This module has unpublished changes.

During my junior year, I had the opportunity to participate in the NASA Space Grant program, and to research in a security-related project led by Dr. Jennifer Kitchen. The project centered around developing a method to verify hardware security threats in RF components by analyzing their performance degradation. We utilized the fact that each RF component observes a unique performance degradation pattern as they age. We hypothesized that by analyzing the performances in an original circuit and an altered circuit then differences in the aging patterns will make it possible to identify when a security threat has been introduced during the manufacturing process. A security threat is done with malicious intent by either making a small change in the process or circuit, or by the manufacturer delivering aged or used counterfeit chips to the chip vendor. If the aging process could be used to verify the quality of components, then government entities who currently need to perform extensive vetting of vendors may be able to simplify their processes and expand their supplier base. 

 

When I recieved the grant, I had already taken several classes on security and spent three semesters in a computer science lab researching cybersecurity, so I was familiar with my chosen Grand Challenge theme. However, I was interested to see how electrical engineering could be utiilized for security research. This project also succeeded in exposing me to a new side of security. Previously, my research focused on the software side of security, but this project focused on hardware security threats and it was interesting to see a new perspectivee on my Grand Challenge theme. 

 

For this project, we chose a circuit component that operates in the radio frequency range. We first kept the component in its original condition, and simulated the aging process by stressing the temperature and voltage ranges. Throughout the process we recorded the performance of the component until it was no longer functional. Then, we altered a component in a way that is consistant with a security threat and repeated the aging processes. Once all the data was collected, we could compare the two aging patterns. Ideally, the patterns would be different  enough to be able to use it to identify when a security threat has been introduced. Additionally, we wanted to perform these tested with multiple types of RF components into to verify that these methods could be utilized universally. 

 

During these two semesters, I learned a lot that I could apply to the rest of my education and future career. This project introduced me to the practical side of electrical engineering and allowed me to delve deeper into concepts that were intoduced in my classes. At the time I had chose my, chosen my electrical engineering concetration to be electromagnetics, so the project also gave me a closer look at this field. I also learned how to use RF equipment that I later used in labs and at my internship. Through the program the Space Grant interns also had multiple opportunites to present our research. This included a poster session in February and a research symposium in April. Not only did this allow me to practice my public speaking, but I also was able to practice making very technical work understandable to the general public. 

 

DRAFT: This module has unpublished changes.