EEL 4714/5716: Introduction to Hardware Security and Trust
- EEL 4714/5716: Introduction to Hardware Security and Trust, Time: Tue (4:05-4:55pm) and Thu (3:00-4:55pm), Room: NEB 201
- Dr. Mark Tehranipoor, Office: MAE 226B (Florida Institute for Cybersecurity Research), Phone: 352-392-2585, Email: email@example.com
Textbooks and Software Required:
- Text Book: None
- Recommended Reference Book: M. Tehranipoor and C. Wang (Eds.), Introduction to Hardware Security and Trust, Springer, 2011.
- Software: Xilinx ISE package, Synopsys Verilog simulation package and HSpice, Cadence Design System, Programming and Scripting Software (Matlab, Python, C/C++).
Course Objectives: This course will cover the following topics: Cryptographic processor and processing overhead analysis, physical and invasive attacks, side-channel attacks, physically unclonable functions, hardware-based true random number generators, watermarking of Intellectual Property (IP) blocks, FPGA security, passive and active metering for prevention of piracy, access control, hardware Trojan detection and isolation in IP cores and integrated circuits (ICs). The course is largely self-contained. Background on digital design would be sufficient. Introductory lectures will cover basic background on cryptography, authentication, secret sharing, VLSI design, test and verification. The main goals for this course are: (1) Learning the state-of-the-art security methods and devices; (2) Integration of security as a design metric, not as an afterthought; (3) Protection of the design intellectual property against piracy and tampering; (4) Better understanding of attacks and providing countermeasures against them; (5) Detection and isolation of hardware Trojans; and (6) Counterfeit Electronics: Detection and Prevention.
12. FGPA Security
Recommended Reading Materials and Videos: