ELEC 5970/ELEC 6970 - Introduction to Hardware Security
Fall 2017, TuTh 11:00AM-12:15PM, Broun 306
Secure electronics has been playing an important role in safeguarding our society and day-to-day lives. Many different electronic devices that are connected to the Internet and have exhibited an increasing level of heterogeneity in recent years. Maintaining security over all these different devices becomes extremely challenging as they are being designed and manufactured in an environment with limited trust and visibility. Various new attacks are emerging to circumvent existing security measures. To enable secure and trust-worthy operation, it is absolutely necessary to understand various attacks and incorporate appropriate security measures. This course is intended for the graduate and undergraduate students who are interested in designing secure systems. This course provides an in-depth analysis of various topics, which includes detection & avoidance of counterfeit ICs, security primitives, cryptography, and side-channel attacks.
Instructor: Ujjwal Guin, Assistant Professor
- Understanding Cryptography: A Textbook for Students and Practitioners, C. Paar, and Jan Pelz, Springer-Verlag Berlin Heidelberg, 2010, ISBN 978-3-642-04100-6
- Counterfeit Integrated Circuits: Detection and Avoidance, M. M. Tehranipoor, U. Guin, and D. Forte, Springer International Publishing, 2015, ISBN: 978-3-319-11823-9
- Introduction to Hardware Security and Trust, M. Tehranipoor, C. Wang, Springer-Verlag New York, 2012, ISBN 978-1-4419-8079-3
- Test 1, November 2, 11:00AM-12:15PM, Broun 306, use only 4 sheets of paper.
- Test 1, TBD, 11:00AM-12:15PM, Broun 306, use only 4 sheets of paper.
- Final Exam, December 13, 12:00 - 2:30PM, Broun 306, Open book and notes.
Topics (28 class meetings/75 minutes each):
- HW1: Assigned 08/31/17 - Due 09/05/17
Recommended materials for further reading:
- Introduction to Cryptography
- Symmetric Ciphers
- Asymmetric Ciphers
- Message Authentication Codes
- Digital Signatures
- Key Management
- Side-Channel Analysis
- Semiconductor Supply Chain
- Counterfeit Integrated Circuits
- Detection of Counterfeit ICs
- Avoidance of Counterfeit ICs
- Physically Unclonable Functions (PUFs)
- True Random Number Generators (TRNGs)
- Hardware Trojans (Self-study)
- Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography. CRC press, 1996.
- M. Tehranipoor, U. Guin, and S. Bhunia, " Invasion of the Hardware Snatchers: Cloned Electronics Pollute the Market", IEEE Spectrum, 2017.
- U. Guin, K. Huang, D. DiMase, J. M. Carulli Jr., M. Tehranipoor, and Y. Makris, " Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain ," Proceedings of the IEEE, 2014.
- Adee, Sally. "The hunt for the kill switch." IEEE Spectrum, 2008.
Related Conferences and Journals:
- US-CERT: United States Computer Emergency Readiness Team
- Creating Projects in Latex
- Manuscript Templates for Conference Proceedings
- Conference on Cryptographic Hardware and Embedded Systems (CHES)
- IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
- Design Automation Conference (DAC)
- International Test Conference (ITC)
- International Conference On Computer Aided Design (ICCAD)
- IEEE VLSI Test Symposium (VTS)
- IEEE Security & Privacy
- IEEE Transactions on Dependable and Secure Computing (TDSC)
- Journal of Hardware and Systems Security (HaSS)