0% found this document useful (0 votes)
101 views1 page

Hardware Security

Uploaded by

sunil kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
101 views1 page

Hardware Security

Uploaded by

sunil kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Hardware Security

(4 Credit Course)
COURSE OBJECTIVES:
 To understand design and evaluation of hardware security primitives and their roles in
functional security and protection against supply chain issues.
 To study all forms of side-channel attacks, namely, power side-channel attacks, timing
attacks, electromagnetic (EM) side-channel attacks, and fault-injection attacks.
 To understand infrastructure-oriented attacks with focus on scan and JTAG. Different
forms of information leakage attacks using on-chip test/debug infrastructure
 To study system-level attacks and countermeasures, possibilities of exploiting hardware
security vulnerabilities by system/application software and SoC security architecture for
secure systems. Assets in a SoC are major targets of software attacks.

COURSE CONTENT:

Unit 1: INTRODUCTION TO HARDWARE SECURITY:


Overview of a computing system, layers of a computing system, what is hardware security,
hardware security vs. Hardware trust, attacks, vulnerabilities, and countermeasures, conflict
between security and test/debug, evolution of hardware security: a brief historical perspective,
bird’s eye view, hands-on approach.
HARDWARE TROJANS: Introduction, SoC Design Flow, Hardware Trojans, Hardware Trojans
in FPGA Designs, Hardware Trojans Taxonomy, Trust Bench marks, Counter measures Against
Hardware Trojans, Hands-on Experiment: Hardware Trojan Attacks. 14 hours

Unit 2: HARDWARE SECURITY PRIMITIVES


Introduction, Preliminaries, Physical Unclonable Function, True Random Number Generator,
Design for Anti-Counterfeit, Existing Challenges and Atta, Primitive Designs with Emerging Nano
devices, Hands-on Experiment: Hardware Security Primitives (PUFs and TRNGs) 10 hours

Unit 3: SIDE-CHANNEL ATTACKS


Introduction, Background on Side-Channel Attacks, Power Analysis Attacks, Electromagnetic (EM)
Side-Channel Attacks, Fault Injection Attacks, Timing Attacks, Covert Channels, Hands-on
Experiment: Side-Channel Attack. 12 hours

Unit 4: TEST-ORIENTED ATTACKS


Introduction, Scan-Based Attacks, JTAG-Based Attacks, Hands-on Experiment: JTAG Attack,
Exercises. 10 hours

Unit 5: SYSTEM LEVEL ATTACKS & COUNTER MEASURES


Introduction, Background on SoC Design, SoC Security Requirements, Security Policy
Enforcement, Secure SoC Design Process, Threat Modelling, Hands-on Experiment: SoC Security
Policy, Exercises. 10 hours

Text Book:
1. Mark Tehranipoor and Swarup Bhunia – “Hardware Security: A Hands-on Learning
Approach” Morgan Kaufmann Publications, 2019.

You might also like