Syllabus for EEL 4930/5934
Introduction
to Hardware Security and Trust,
Spring 2016
1. Catalog Description
Fundamentals
of hardware security and trust for integrated circuits. Cryptographic hardware,
invasive and non-invasive attacks, side-channel attacks, physically unclonable
functions (PUFs), true random number generation (TRNG). watermarking of
Intellectual Property (IP) blocks, FPGA security, counterfeit detection,
hardware Trojan detection and prevention in IP cores and integrated circuits. Lecture.
Credits 3.
2. Pre-requisites
EEL4712C Digital Design
3. Course Objectives
This course will
cover the following topics: Cryptographic processor and processing overhead analysis,
physical and invasive attacks, side-channel attacks,
physically unclonable functions, hardware-based true random number
generators, watermarking of Intellectual Property (IP) blocks, FPGA security,
passive and active metering for prevention of piracy, access control, hardware
Trojan detection and isolation in IP cores and integrated circuits (ICs). The
course is self contained. Background on digital design would be
sufficient. Introductory lectures will cover basic background on cryptography,
authentication, secret sharing, VLSI design, test and verification. The
main goals for this course are:
· Learning
the state-of-the-art security methods and devices
·
Integration of security as a design metric, not as an afterthought
· Protection
of the design intellectual property against piracy and tampering
· Better
understanding of attacks and providing countermeasures against them
· Detection
and isolation of hardware Trojans
·
Counterfeit Electronics: Detection and Prevention
4. Contribution of course to meeting ABET
professions Component
One semester of engineering topics
(e.g., Hardware Security Fundamental and Practice-oriented Solutions)
5. Relationship of course to ABET program outcomes
- an
ability to apply knowledge of mathematics, science, and engineering
- an understanding of professional and ethical responsibility
- a recognition of the need for, and an ability to engage in life-long
learning
- a knowledge of contemporary issues
- an ability to use the techniques, skills, and modern engineering tools
necessary for engineering
practice
6. Instructors/coordinators:
Dr. Domenic Forte
LAR 339E
352-392-1525
Dr. Swarup Bhunia
LAR 336A
352-392-5989
Dr. Mark Tehranipoor
BEN 325
352-392-2585
7. Teaching assistants
Lab TA contact
information and office hours to be posted on the website
The TA will be available to assist
students during his/her office hours. He/she will also assist with grading,
evaluation of student modules and final projects.
7a. Technical Support:
8. Meeting Times
TBD
9. Meeting Location
TBD
10. Material and Supply Fees
One FPGA board for each project team
($150 / team) – each team may include up to 3 students
11. Laboratory Schedule
None
12. Textbooks and Software Required
a. M. Tehranipoor and C.
Wang, Introduction to Hardware Security and Trust, Springer, 2011
b. Software: Xilinx ISE package,
Synopsys Verilog simulation package
13. Recommended Reading
·
http://www.youtube.com/watch?v=dbZiUe6guxc
http://www.youtube.com/watch?v=Iw4g6H7alvo
http://www.youtube.com/watch?v=5vN_7NJ4qYA
http://www.youtube.com/watch?v=Iw4g6H7alvo
http://www.youtube.com/watch?v=5vN_7NJ4qYA
14.
Course Outline
Group 1
|
||||
Lect
|
Wk
|
Date
|
Day
|
Topic
|
1
|
1
|
TBD
|
TBD
|
Syllabus, Ethics, Introduction to
hardware security and trust, Emerging applications and the new threats
|
2
|
2
|
TBD
|
TBD
|
Introduction to Cryptography
|
3
|
3
|
TBD
|
TBD
|
Basics of VLSI Design and
Test
|
4
|
4
|
TBD
|
TBD
|
Security Based on
Physically Unclonability and Disorder
|
5
|
5
|
TBD
|
TBD
|
Hardware Metering
|
6
|
5
|
TBD
|
TBD
|
Watermarking of HW IPs
|
7
|
6
|
TBD
|
TBD
|
Physical Attacks and Tamper
resistance
|
8
|
7
|
TBD
|
TBD
|
Side Channel Attacks and
Countermeasures, Countermeasures for Embedded Microcontrollers
|
9
|
8
|
TBD
|
TBD
|
Fault Injection Attacks
|
10
|
8
|
TBD
|
TBD
|
Security in Embedded Systems
|
11
|
9
|
TBD
|
TBD
|
Security for RFID Tags
|
12
|
9
|
TBD
|
TBD
|
Hardware Trojans: IC Trust
(Taxonomy and Detection)
|
13
|
10
|
TBD
|
TBD
|
Hardware Trojans: IP Trust
(Detection)
|
14
|
11
|
TBD
|
TBD
|
Design for Hardware Trust
|
15
|
12
|
TBD
|
TBD
|
Protecting against
Scan-based Side Channel Attacks
|
16
|
13
|
TBD
|
TBD
|
Counterfeit Detection and
Avoidance
|
17
|
14
|
TBD
|
TBD
|
Students presentation
|
18
|
15
|
TBD
|
TBD
|
Students presentation
|
19
|
16
|
TBD
|
TBD
|
Students presentation
|
20
|
17
|
TBD
|
TBD
|
Students presentation
|
15. Attendance and Expectations
a. Format: The course is comprised of
weekly lectures, 3-4 modules, student presentation module, and a final project.
Students must submit individual
work
individually on each module and as a team of 3 on final
project. You are encouraged to work
together on homework assignments and share ideas on lab assignments. However you are not allowed to copy or
duplicate any lab material (code, drawings, etc.) from another student. This work will be considered cheating and
will be dealt with in a severe manner.
See Section 19 on Honesty Policy.
It is the student’s responsibility to
return all FGPA boards by the time of project demonstration.
No comments:
Post a Comment