3-0-0-0 (9)
Knowledge equivalent of CS220 and CS641
PhD, Masters, 3rd and 4th year UG Students
CSE, EE
The domain of hardware security mainly covers the protection of physical device from different security threats posed by information leakage through covert channels, Trojan insertion, machine learning attacks, in- vasive or semi-invasion attacks etc. Even, secure deployment of various hardware security primitives in the untrusted environments entails several hardware and protocol level challenges. In this course, we will focus on the ever-increasing number of connected devices in IoT framework and analyse the impact of real world threats. And then, we will intro- duce various hardware security primitives for authentication and secure communication. The contents selected for the course are based on research papers from top-tier journals and conferences such as IEEE TIFS, IACR TCHES, IEEE TDSC, ACM TECS, CCS, S&P, USENIX, DAC, DATE etc. covering advanced topics of hardware security.
S. No. | Broad Title | Topics |
No. of Lectures |
1 | IoT Building Blocks | IoT Technology Stack, Protocols, Applications, Role of Hardware | 1 |
2 | Symmetric Key Cryptography | Design Principles of AES, PRESENT and SIMON | 2 |
3 | Asymmetric Key Cryptography | Design Principles of RSA and ECC | 2 |
4 | Hardware Design | Motivation, Advantages, Usecase: AES | 1 |
5 | Power Attacks | Power Models, Differential and Correlation Power Attacks, Countermeasures | 4 |
6 | Fault Attacks | Differential Fault Analysis, Fault Models, Countermeasures | 4 |
7 | Timing Side Channel | Timing Attacks, Cache Attacks, Micro-Architectural Attacks, Impact on IoT | 2 |
8 | Side Channel on Smart Devices | Use cases: Smart Light, Smart Home, Mobile App, Wearables | 1 |
9 | Physically Unclonable Functions | Design Principles, Compositions, Machine Learning Attacks, Side Channel Attacks | 6 |
10 | True Random Number Generator | Design Principles, NIST and AIS Test, Attacks on TRNG | 3 |
11 | Hardware Trojan | Impact, Design methodologies, Detection Techniques | 1 |
12 | Security Protocols | Basic attack notions of protocols, Use cases: Attacks on WPA2 handshake, Keyless entry systems of automotive system, logjam attacks in TLS Layer | 2 |
13 | PUF Based Authentication | Authentication Protocols, Applications, Attacks, Bit commitment and oblivious transfer protocols | 6 |
14 | Remote Attestation | Difference between Attestation, Authentication and Identi cation, Attestation with software RoT and hardware RoT | 2 |
15 | Anonymous Authetication | Applicability in IoT Framework, Intel EPID Technology, PUF based Anonymity | 3 |