Home > Teaching > CS 698U: Hardware Security for Internet-of-Things

CS 698U: Hardware Security for Internet-of-Things

3-0-0-0 (9)


Knowledge equivalent of CS220 and CS641


Who can take the course:
PhD, Masters, 3rd and 4th year UG Students
Departments that may be interested:


Course Objective

The domain of hardware security mainly covers the protection of physical device from different security threats posed by information leakage through covert channels, Trojan insertion, machine learning attacks, in- vasive or semi-invasion attacks etc. Even, secure deployment of various hardware security primitives in the untrusted environments entails several hardware and protocol level challenges. In this course, we will focus on the ever-increasing number of connected devices in IoT framework and analyse the impact of real world threats. And then, we will intro- duce various hardware security primitives for authentication and secure communication. The contents selected for the course are based on research papers from top-tier journals and conferences such as IEEE TIFS, IACR TCHES, IEEE TDSC, ACM TECS, CCS, S&P, USENIX, DAC, DATE etc. covering advanced topics of hardware security.


Course Contents


S. No. Broad Title Topics

No. of


1 IoT Building Blocks IoT Technology Stack, Protocols, Applications, Role of Hardware 1
2 Symmetric Key Cryptography Design Principles of AES, PRESENT and SIMON 2
3 Asymmetric Key Cryptography Design Principles of RSA and ECC 2
4 Hardware Design Motivation, Advantages, Usecase: AES 1
5 Power Attacks Power Models, Differential and Correlation Power Attacks, Countermeasures 4
6 Fault Attacks Differential Fault Analysis, Fault Models, Countermeasures 4
7 Timing Side Channel Timing Attacks, Cache Attacks, Micro-Architectural Attacks, Impact on IoT 2
8 Side Channel on Smart Devices Use cases: Smart Light, Smart Home, Mobile App, Wearables 1
9 Physically Unclonable Functions Design Principles, Compositions, Machine Learning Attacks, Side Channel Attacks 6
10 True Random Number Generator Design Principles, NIST and AIS Test, Attacks on TRNG 3
11 Hardware Trojan Impact, Design methodologies, Detection Techniques 1
12 Security Protocols Basic attack notions of protocols, Use cases: Attacks on WPA2 handshake, Keyless entry systems of automotive system, logjam attacks in TLS Layer 2
13 PUF Based Authentication Authentication Protocols, Applications, Attacks, Bit commitment and oblivious transfer protocols 6
14 Remote Attestation Difference between Attestation, Authentication and Identi cation, Attestation with software RoT and hardware RoT 2
15 Anonymous Authetication Applicability in IoT Framework, Intel EPID Technology, PUF based Anonymity 3


  1.  Debdeep Mukhopadhyay and Rajat Subhra Chakraborty, "Hardware Security: Design, Threats, and Safeguards", CRC Press, 2014.
  2.  Doug Stinson, Cryptography Theory and Practice, CRC Press, 2005.
  3.  William Stallings, "Cryptography and Network Security", Pearson, 2013.


  1.  Samir Palnitkar, "Verilog HDL: A Guide to Digital Design and Synthesis", Prentice-Hall, 1996.
  2.  Michael D. Ciletti, "Advanced Digital Design with the Verilog HDL", Pearson, 1996.
  3.  Ted Hu mire et al: "Handbook of FPGA Design Security", Springer, 2014.