CS984: Introduction to Hardware Security

 

Credits: x-x-x-x

 

Instructor:

Dr. Shubham Sahay

 

· Major, Measurable Learning Objectives

 

Having successfully completed this course, the student will be able to:

 

· Understand how the security vulnerabilities impact the cyber-physical systems in this era of IoT.

· Learn about the possible attacks on the cyber-physical systems in detail.

· Develop an understanding of integrated hardware security primitives such as Random number generator and physical unclonable functions.

· Understand CMOS implementation of hardware security primitives.

· Learn about the variabilities in the emerging non-volatile memories and their utilization as entropy source for hardware security primitives.

 

· Prerequisites and Co-requisites

 

None. Though a UG course on device physics/digital circuits would be helpful.

 

· Texts and Special Teaching Aids

 

Course notes/slides, video lectures, and other documentations will be provided to students by the instructor. Self-study would be an important component of this course. 

 

· Syllabus

 

The students will be exposed to the following topics:

  1. Internet of things (IoT) ecosystem and security vulnerabilities
  2. Attacks on cyber-physical systems
  3. Reverse Engineering
  4. Side-channel attacks
  5. Intellectual Property (IP) piracy
  6. Hardware Trojan
  7. Electronic counterfeiting
  8. Hardware security primitives
  9. Physical Unclonable Function (PUF)
  10. Characterizing PUFs: Strong vs. weak PUFs
  11. Random number generator (RNG)
  12. Characterizing RNGs: Pseudo vs True RNG
  13. CMOS PUF implementations
  14. CMOS RNG implementations
  15. Emerging non-volatile memories (eNVM)
  16. PUF implementation using eNVMs
  17. RNG implementation using eNVMs

The course will consist of 20 hours of lectures.

 

· Grading

Semester grades will be based on the following weights.

  • Midterm Exam                 30%
  • Final Exam                         40%
  • Assignments                     30% 

 

Grades will be determined after all work is completed and graded.

 

Coverage of Topics 

Topic

No. of Hours

Internet of things (IoT) ecosystem and security vulnerabilities

Attacks on cyber-physical systems

  • Reverse Engineering
  • Side-channel attacks
  • Intellectual Property (IP) piracy
  • Hardware Trojan
  • Electronic counterfeiting

Hardware security primitives

Physical Unclonable Function (PUF)

Characterizing PUFs: Strong vs. weak PUFs

Random number generator (RNG)

Characterizing RNGs: Pseudo vs True RNG

CMOS PUF implementations

CMOS RNG implementations

Emerging non-volatile memories (eNVM)

  • 3D NAND Flash memory
  • Resistive RAM (RRAM)
  • Phase change memory (PCM)
  • Spin-transfer Torque Magnetic RAM (STT-MRAM)

PUF implementation using eNVMs

RNG implementation using eNVMs

1

4

 

 

 

 

 

 

 

1

1

2

1

1

1

1

3

 

 

 

 

 

2

2

Total

20