Secure, Trusted, and Assured Microelectronics (STAM) Center

The STAM Center investigates new technologies and methodologies to offer opportunities for designing secure computing devices and systems that go beyond what is currently achievable. The center couples its research mission with active recruiting and training of students, especially domestic students, targeting applications of national security importance.

The center conducts fundamental research in three technical areas meant to establish the foundation for future secure and trusted semiconductor/ microelectronics technologies: (1) new substrates, synthesis, and fabrication, (2) new computing paradigms and architectures, and (3) integrated sensing, edge computing, and secure communications.

Latest News

Data Analysis and Visualization Tool

GaugeViz is an information analysis and interpretation tool that works on bulk unsorted and unlabeled data to find patterns hidden 'between' data points. Gauge extends analyst capabilities by grouping similar data into clusters where their differences can be highlighted, and an analyst can develop an understanding of cause and effect within a local area. GaugeViz Tool Link:

RISC-V Development Platform

A new version of our Trireme Platform is released. Trireme is a complete environment for RISC-V based design space exploration, testing, and deployment. Written in Verilog 2001 without any vendor-specific or 3rd party IP, it allows you to simulate, emulate, and boot Linux on directly generated or customized RTL cores. Trireme Platform Link:

STAM Center Open House Highlights

The open house event gave the STAM Center the opportunity to share with the ASU community our research efforts around the security and trustworthiness of microelectronics and computer systems. We thank all the attendees and exhibitors at the STAM Center open house event for making it a success.

The new ASU Cyber Range is operational

The Arizona Cyber Range (AzCR) a hybrid cyber range specifically developed as a training platform for security issues related to real hardware/electronic devices. The devices include microcontrollers, industrial control system (ICS), supervisory control and data acquisition (SCADA), field programmable gate arrays (FPGAs), Internet of Things (IoT), and industrial IoTs.

STAM Center at GOMACTech 2022 Conference

Center researchers in collaboration with researcher from MIT introduced a new processor architecture for use in accelerator-based edge processing systems. The architecture includes security features to protect the system in uncontrolled, unattended environments while adapting its resource utilization and processing to ambient events.

Prof. Kinsy gives a talk at MIT on “Designing Secure Computing Systems from Untrusted Components”

On October 25th, Prof. Kinsy gave a talk at MIT titled "Secure and Trusted Microelectronics: Designing Secure Computing Systems from Untrusted Components", with the following abstract: The current trend in system-on-chip (SoC) design is system-level integration of heterogeneous technologies consisting of a large number of processing elements such as programmable RISC cores, memories, DSPs, and accelerator function units/ASIC...


Researchers and students at the center investigate, design and prototype application-aware processors and embedded systems with cybersecurity compliance, technology transfer and field tests readiness in mind. The team uses a multidisciplinary and integrative approach consisting of algorithmic optimization, design flow automation, hardware-firmware co-development and prototyping. The center is organized in six research laboratories – two technology laboratories (SemiSec Laboratory and LUCS), and four application laboratories (ASCS Laboratory, AITS Laboratory, CAES Laboratory, and SECPS Laboratory).

Semiconductor Security

Semiconductor Security (SemiSEC) Laboratory: Zero-Trust IC Fabrication, Age-related IC Failures and Security, Supply Chain Trust Challenges, Secure-by-Construction IC Design

 Unconventional Substrates 

Laboratory for Unconventional Computing Substrates (LUCS): Approximate Computing, Cryogenics Computing, Quantum Computing, Secure Bio-Microelectronics

Adaptive and Secure Systems 

Adaptive and Secure Computing Systems (ASCS) Laboratory: Situation-Aware Computing, Post-Quantum Security, Self-Healing Systems

Private and Secure AI

Artificial Intelligence Technology and Systems (AITS) Laboratory: Privacy-Preserving AI/ML Systems Secure ML Hardware Accelerators Real-Time/Low-power ML Engines

Computer Architecture

Computer Architecture & Embedded Systems (CAES) Laboratory: Trusted Execution Environment Architecture, Enclave-Driven Architecture, Secure High-Performance Computing Architecture, Graph Processor Design.

Secure & Resilient IoT Systems

Secure & Resilient Cyber-Physical Systems (SECPS) Laboratory: Physically-Distributed Systems and Infrastructures, Sharing Confidential Information in IoT Systems, Secure Group Anonymous Authentication