Hardware Security-University of Maryland

Course description:

In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.

Course Syllabus
Trust in digital system design

Vulnerability in combinational logic

Vulnerability in sequential logic and finite state machine

Hardware Trojan Horse

Circuit obfuscation

Side-channel attacks

Power analysis

Timing attacks

ElectroMagnetic analysis

Physical attacks

Fault injection attack

Smart card security

Field Programmable Gate Array (FPGA) security

Emerging hardware security topics

Trust Platform Modules (TPM)

Physical Unclonable Functions (PUF)

True Random Number Generators (TRNG)

RFID tag


Intellectual property protection