CS984: Introduction to Hardware Security
Credits: x-x-x-x
Instructor:
Dr. Shubham Sahay
· Major, Measurable Learning Objectives
Having successfully completed this course, the student will be able to:
· Understand how the security vulnerabilities impact the cyber-physical systems in this era of IoT.
· Learn about the possible attacks on the cyber-physical systems in detail.
· Develop an understanding of integrated hardware security primitives such as Random number generator and physical unclonable functions.
· Understand CMOS implementation of hardware security primitives.
· Learn about the variabilities in the emerging non-volatile memories and their utilization as entropy source for hardware security primitives.
· Prerequisites and Co-requisites
None. Though a UG course on device physics/digital circuits would be helpful.
· Texts and Special Teaching Aids
Course notes/slides, video lectures, and other documentations will be provided to students by the instructor. Self-study would be an important component of this course.
· Syllabus
The students will be exposed to the following topics:
- Internet of things (IoT) ecosystem and security vulnerabilities
- Attacks on cyber-physical systems
- Reverse Engineering
- Side-channel attacks
- Intellectual Property (IP) piracy
- Hardware Trojan
- Electronic counterfeiting
- Hardware security primitives
- Physical Unclonable Function (PUF)
- Characterizing PUFs: Strong vs. weak PUFs
- Random number generator (RNG)
- Characterizing RNGs: Pseudo vs True RNG
- CMOS PUF implementations
- CMOS RNG implementations
- Emerging non-volatile memories (eNVM)
- PUF implementation using eNVMs
- RNG implementation using eNVMs
The course will consist of 20 hours of lectures.
· Grading
Semester grades will be based on the following weights.
- Midterm Exam 30%
- Final Exam 40%
- Assignments 30%
Grades will be determined after all work is completed and graded.
Coverage of Topics
Topic |
No. of Hours |
Internet of things (IoT) ecosystem and security vulnerabilities Attacks on cyber-physical systems
Hardware security primitives Physical Unclonable Function (PUF) Characterizing PUFs: Strong vs. weak PUFs Random number generator (RNG) Characterizing RNGs: Pseudo vs True RNG CMOS PUF implementations CMOS RNG implementations Emerging non-volatile memories (eNVM)
PUF implementation using eNVMs RNG implementation using eNVMs |
1 4
1 1 2 1 1 1 1 3
2 2 |
Total |
20 |