Report 03 - Hardware Security Research Proposal

2026-04-12  |  Report , Hardware Security , Research Proposal

Introduction

Throughout this course you have been introduced to a number of aspects of hardware security, including current state of the art research areas. In the final report for this course you will identify a research gap/opportunity within the hardware security field, and form a one-page research proposal containing 3 research questions and proposed directions for answering those questions. Such proposals are frequently used in both academic and industry research labs when applying for project funds.

Instructions

  1. Identify a research area, and within it, propose three research questions which would advance the state of the art.
  2. Create a one-page proposal:
    • IEEE two-column format with the following options
      • A4 paper size
      • 9pt font
      • 1cm margins
    • In LaTeX, this can be done with the following:
      • \documentclass[9pt,conference,a4paper]{IEEEtran}
      • \usepackage[top=1cm, bottom=1cm, left=1cm, right=1cm]{geometry}
  3. The proposal should have the following headings:
    • Background:
      • Set the scene for your research, describe the current area and introduce the research problem.
    • Research gap:
      • Elaborate on the specific research problem. Why is it a problem, and why is this problem significant?
    • Goals and Objectives:
      • Describe the aims of the research such that it addresses your research gap (i.e. identify and justify your three research questions). Describe what some key outcomes of your research might be, and how you might quantify or qualify those outcomes (e.g. metrics? measurables?). What data is needed? And so on.
    • Research plan:
      • Describe how you intend to approach the research. Whereas the previous section describes specific outcomes, this section will propose methodologies, how you might collect the data, and how you plan to organize your research into tasks.
    • References:
      • Your text should use in-text references. Aim for around 4-5 references.

Do not use an LLM for this work, including for generating references, proof-reading, or editing. I will be reviewing for tone and authenticity alongside technical accuracy and content.

Deliverables

Deliverables:

  1. One page report, saved as PDF, as described in Instructions (4%)
    • Covers a single hardware security proposal.

Resources

Students may find the following sources helpful when looking for hardware research topics.

Grading Rubric

Research Proposal (7%)