Hardware Security and Trust

Dr. Mohammad Tehranipoor-- Electrical and Computer Engineering, University of Connecticut, Storrs, CT

Course description:

This course will cover the following topics: Cryptographic processor and processing overhead analysis, physical and invasive attacks, side-channel attacks, physically unclonable functions, hardware-based true random number generators, watermarking of Intellectual Property (IP) blocks, FPGA security, passive and active metering for prevention of piracy, access control, hardware Trojan detection and isolation in IP cores and integrated circuits (ICs). The course is self contained. Background on digital design would be sufficient. Introductory lectures will cover basic background on cryptography, authentication, secret sharing, VLSI design, test and verification. The main goals for this course are:

· Learning the state-of-the-art security methods and devices

· Integration of security as a design metric, not as an afterthought

· Protection of the design intellectual property against piracy and tampering

· Better understanding of attacks and providing countermeasures against them

· Detection and isolation of hardware Trojans

[none]