Thursday, September 24, 2015

New Course for Spring 2016-EE Technical Elective EEL4930/5934



Syllabus for EEL 4930/5934
Introduction to Hardware Security and Trust, 
Spring 2016
    
1. Catalog Description

Fundamentals of hardware security and trust for integrated circuits. Cryptographic hardware, invasive and non-invasive attacks, side-channel attacks, physically unclonable functions (PUFs), true random number generation (TRNG). watermarking of Intellectual Property (IP) blocks, FPGA security, counterfeit detection, hardware Trojan detection and prevention in IP cores and integrated circuits. Lecture. Credits 3.

2. Pre-requisites
 EEL4712C Digital Design

3. Course Objectives
This course will cover the following topics: Cryptographic processor and processing overhead analysis, physical and invasive attacks, side-channel attacks, physically unclonable functions, hardware-based true random number generators, watermarking of Intellectual Property (IP) blocks, FPGA security, passive and active metering for prevention of piracy, access control, hardware Trojan detection and isolation in IP cores and integrated circuits (ICs). The course is self contained. Background on digital design would be sufficient. Introductory lectures will cover basic background on cryptography, authentication, secret sharing, VLSI design, test and verification. The main goals for this course are: 
·  Learning the state-of-the-art security methods and devices
·  Integration of security as a design metric, not as an afterthought
·  Protection of the design intellectual property against piracy and tampering
·  Better understanding of attacks and providing countermeasures against them
·  Detection and isolation of hardware Trojans
·  Counterfeit Electronics: Detection and Prevention

4. Contribution of course to meeting ABET professions Component
One semester of engineering topics (e.g., Hardware Security Fundamental and Practice-oriented Solutions)

5. Relationship of course to ABET program outcomes
- an ability to apply knowledge of mathematics, science, and engineering 
- an understanding of professional and ethical responsibility
- a recognition of the need for, and an ability to engage in life-long learning
- a knowledge of contemporary issues
- an ability to use the techniques, skills, and modern engineering tools necessary for engineering 
    practice



6. Instructors/coordinators:       

Dr. Domenic Forte
LAR 339E             
352-392-1525    

Dr. Swarup Bhunia
LAR 336A
352-392-5989    
http://swarup.ece.ufl.edu                                         

Dr. Mark Tehranipoor
BEN 325
352-392-2585



      
7. Teaching assistants

Lab TA contact information and office hours to be posted on the website

The TA will be available to assist students during his/her office hours. He/she will also assist with grading, evaluation of student modules and final projects.

7a. Technical Support:

8. Meeting Times
TBD

9. Meeting Location
TBD

10. Material and Supply Fees
One FPGA board for each project team ($150 / team) – each team may include up to 3 students

11. Laboratory Schedule
None

12. Textbooks and Software Required
a. M. Tehranipoor and C. Wang, Introduction to Hardware Security and Trust, Springer, 2011
b. Software: Xilinx ISE package, Synopsys Verilog simulation package

13. Recommended Reading
·         The Hunt for the Kill Switch
·         Hardware Trojan (computing)
·         Security through obscurity
·         Trust-Hub
 



14.  Course Outline




Group 1
Lect
Wk
Date
Day
Topic
1
1
TBD
TBD
Syllabus, Ethics, Introduction to hardware security and trust, Emerging applications and the new threats
2
 2
TBD
TBD
Introduction to Cryptography

3
 3
TBD
TBD
Basics of VLSI Design and Test
4
4
TBD
TBD
Security Based on Physically Unclonability and Disorder
5
5
TBD
TBD
Hardware Metering
6
5
TBD
TBD
Watermarking of HW IPs
7
6
TBD
TBD
Physical Attacks and Tamper resistance
8
7
TBD
TBD
Side Channel Attacks and Countermeasures, Countermeasures for Embedded Microcontrollers
9
TBD
TBD
Fault Injection Attacks
10
8
TBD
TBD
Security in Embedded Systems
11
9
TBD
TBD
Security for RFID Tags
12
9
TBD
TBD
Hardware Trojans: IC Trust (Taxonomy and Detection)
13
10
TBD
TBD
Hardware Trojans: IP Trust (Detection)
14
11 
TBD
TBD
Design for Hardware Trust
15
12
TBD
TBD
Protecting against Scan-based Side Channel Attacks
16
13
TBD
TBD
Counterfeit Detection and Avoidance
17
14
TBD
TBD
Students presentation
18
15
TBD
TBD
Students presentation
19
16
TBD
TBD
Students presentation
20
17
TBD
TBD
Students presentation

15. Attendance and Expectations
a. Format: The course is comprised of weekly lectures, 3-4 modules, student presentation module, and a final project.

Students must submit individual work individually on each module and as a team of 3 on final project.  You are encouraged to work together on homework assignments and share ideas on lab assignments.  However you are not allowed to copy or duplicate any lab material (code, drawings, etc.) from another student.  This work will be considered cheating and will be dealt with in a severe manner.  See Section 19 on Honesty Policy.

It is the student’s responsibility to return all FGPA boards by the time of project demonstration.

 

No comments:

Post a Comment

Updates on Course Offerings

Hi EE Majors, Just reminder when certain courses will be offered as of Fall 2019.   This is not an exhaustive list; schedules can change...

Blog Archive