Mark M. Tehranipoor, PhD, Fellow of IEEE, ACM, NAI

Intel Charles E. Young Preeminence Endowed Chair Professor in Cybersecurity

Chair, ECE Department, University of Florida

Co-founder, IEEE Int. Symposium on Hardware-Oriented Security and Trust (HOST), IEEE AsianHOST, AND IEEE PAINE

Director, Edaptive Computing Inc. Transition Center (ECI-TC)

Co-director, AFOSR/AFRL Center of Excellence on Enabling Cyber Defense in Analog and Mixed Signal Domain (CYAN)

Co-director, National Microelectronic Security Training Center (MEST)

  • Home
  • CV
  • Publications
  • Sponsors
  • Awards/Honors
  • People
  • Professional Activities
  • Invited Talks
  • Press
  • Teaching
  • Prospective Students
  • Contact
  • Textbook
  • Trust-Hub
  • HOST Symposium
  • Asian HOST
  • HaSS Journal
  • FICS Research
  • MEST Center
  • CYAN Center
  • CAD For Security
  • Future Microelectronics Security Research Series

EEL4714/5716 Intro to Hardware Security and Trust


EEL 4714/5716: Introduction to Hardware Security and Trust


Course Info:

  • EEL 4714/5716: Introduction to Hardware Security and Trust, Time: Tue (4:05-4:55pm) and Thu (3:00-4:55pm), Room: NEB 201

Instructor Info:

  • Dr. Mark Tehranipoor, Office: MAE 226B (Florida Institute for Cybersecurity Research), Phone: 352-392-2585, Email: tehranipoor@ufl.edu

Textbooks and Software Required:

  • Text Book: None
  • Recommended Reference Book: M. Tehranipoor and C. Wang (Eds.), Introduction to Hardware Security and Trust, Springer, 2011.
  • Software: Xilinx ISE package, Synopsys Verilog simulation package and HSpice, Cadence Design System, Programming and Scripting Software (Matlab, Python, C/C++).

Course Objectives: This course will cover the following topics: Cryptographic processor and processing overhead analysis, physical and invasive attacks, side-channel attacks, physically unclonable functions, hardware-based true random number generators, watermarking of Intellectual Property (IP) blocks, FPGA security, passive and active metering for prevention of piracy, access control, hardware Trojan detection and isolation in IP cores and integrated circuits (ICs). The course is largely self-contained. Background on digital design would be sufficient. Introductory lectures will cover basic background on cryptography, authentication, secret sharing, VLSI design, test and verification. The main goals for this course are: (1) Learning the state-of-the-art security methods and devices; (2) Integration of security as a design metric, not as an afterthought; (3) Protection of the design intellectual property against piracy and tampering; (4) Better understanding of attacks and providing countermeasures against them; (5) Detection and isolation of hardware Trojans; and (6) Counterfeit Electronics: Detection and Prevention.

Presentation Slides:

1. Introduction to hardware security and trust, emerging applications and the new threats

2. Introduction to Cryptography

3. Basics of VLSI Design and Test

4. Security Based on PUFs and TRNGs

5. Hardware Metering

6. Watermarking of HW IPs

7. Physical Attacks

8. Fault Injection Attacks

9. Hardware Trojans: Detection and Prevention

10. Counterfeit Detection and Avoidance

11. Side Channel Attacks and Countermeasures

12. FGPA Security

13. Basics of PCB Security

14. Protecting against Scan-based Side Channel Attacks

15. Security of RFID Tags


Additional Lectures:

1. Short Tutorial on HDL/Verilog

2. Short Tutorial on FPGA Design

3. Tutorial on CAD Tools


Recommended Reading Materials and Videos:


Reading:

Mihir Bellare and Phil Rogaway, Introduction to Modern Cryptography

Ross J. Anderson. Security Engineering: A guide to building dependable distributed systems. John Wiley and Sons, 2001

Matt Bishop , Computer Security: Art and Science, Addison-Wesley, 2003

William Stallings. Cryptography and Network Security, Fourth edition, 2007 (WS)

The Hunt for the Kill Switch

Hardware Trojan (computing)

Defense Science Board Task Force On High Performance Microchip Supply

Old Trick Threatens the Newest Weapons

A Survey of Hardware Trojan taxonomy and Detection

Hardware Trojans: Lessons Learned After One Decade of Research

Detecting malicious inclusions in secure hardware: Challenges and Solutions

FPGA Design Security Bibliography

Supergeek pulls off ‘near impossible’ crypto chip hack

Security through obscurity

Trust-Hub


Videos:

What’s inside a microchip?

Zoom Into a Microchip

Public Key Cryptography: RSA Encryption

Counterfeit Electronics Could Be Dangerous, Funding Nefarious People

How Computers and Electronics Are Recycled

Counterfeit Electronic Components Process

Counterfeit Inspection

AES cipher visualization