ELEC 5290/ELEC 6290: Hardware Security II

Spring 2022, 9:00 am - 9:50 am, MWF, Broun Hall 235

Goals:
    Secure electronic products play an essential role in safeguarding our society and day-to-day lives. Many different electronic devices that are connected to the Internet have exhibited an increased level of heterogeneity in recent years. Maintaining security over all these different devices becomes exceptionally challenging, as they are being designed and manufactured in an environment with limited trust and visibility. Various new attacks are emerging to circumvent existing security measures. It is essential to understand these attacks and incorporate appropriate security measures to enable secure and trustworthy operations. This course is intended for graduate and undergraduate students who are interested in designing secure systems. This course provides an in-depth analysis of various topics, including advanced cryptography, hardware Trojans, PUFs, RFID security, side-channel attacks and solutions, and blockchain.
Course Syllabus

Instructor: Ujjwal Guin, Assistant Professor

Reference Books:
  1. Understanding Cryptography: A Textbook for Students and Practitioners, C. Paar, and Jan Pelz, Springer-Verlag Berlin Heidelberg, 2010, ISBN 978-3-642-04100-6
  2. Counterfeit Integrated Circuits: Detection and Avoidance, M. M. Tehranipoor, U. Guin, and D. Forte, Springer International Publishing, 2015, ISBN: 978-3-319-11823-9
  3. Mastering Bitcoin: Programming the Open Blockchain, Andreas M. Antonopoulos, O'Reilly, 2017, ISBN-13: 978-1491954386
Exam Schedule:
  1. Test 1, TBD, 9:00 am - 9:50 am, Broun 235, use only 4 sheets of paper.
  2. Final Exam, Friday, May 6, 8:00 a.m.-10:30 a.m, Broun 235, Open book or 4 sheets of paper.
Topics:
  1. Introduction (1 Class)
  2. Block Ciphers: Modes of Operation (2 Classes)
  3. Elliptic Curve Cryptosystems (4 Classes)
  4. Hash function: SHA-3 (1 Class)
  5. Key Establishment (2 Classes)
  6. Side-Channel Analysis (4 Classes)
  7. Hardware Trojans (4 Classes)
  8. Detection and Avoidance of Counterfeit Integrated Circuits (1 Class)
  9. Physically Unclonable Functions (PUFs) (4 Classes)
  10. RFID Security (1 Class)
  11. Blockchain (5 Classes)
Recommended materials for further reading:
  1. Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography. CRC press, 1996.
  2. M. Tehranipoor, U. Guin, and S. Bhunia, " Invasion of the Hardware Snatchers: Cloned Electronics Pollute the Market", IEEE Spectrum, 2017.
  3. U. Guin, K. Huang, D. DiMase, J. M. Carulli Jr., M. Tehranipoor, and Y. Makris, " Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain ," Proceedings of the IEEE, 2014.
  4. Adee, Sally. "The hunt for the kill switch." IEEE Spectrum, 2008.
Useful Links:
  1. US-CERT: United States Computer Emergency Readiness Team
  2. JavaScript Cryptography
  3. Creating Projects in Latex
  4. Manuscript Templates for Conference Proceedings
Related Conferences and Journals:
  1. Conference on Cryptographic Hardware and Embedded Systems (CHES)
  2. IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
  3. Design Automation Conference (DAC)
  4. International Test Conference (ITC)
  5. International Conference On Computer Aided Design (ICCAD)
  6. IEEE VLSI Test Symposium (VTS)
  7. IEEE Security & Privacy
  8. IEEE Transactions on Dependable and Secure Computing (TDSC)
  9. Journal of Hardware and Systems Security (HaSS)