Cyber security is now a critical concern in a wide range of embedded computing, communications systems, and connected devices. Hardware-based security techniques can help prevent a range of attacks more effectively and with better system performance than software-only approaches. This course introduces hardware approaches to cyber-security.
Hardware security sits at the intersection of hardware design and cryptographic engineering. This course provides in-depth introduction to the role that hardware security plays in cybersecurity and computer hardware related attacks and defense in computing systems.
Topics covered are computing systems security requirements: integrity and authentication, among others; core security techniques: encryption algorithms, key distribution and management; hardware attacks: hardware Trojans, side-channel attacks, fault attacks, hardware counterfeiting; trusted hardware primitives: trusted digital system design, circuit obfuscation, trust platform modules, physical unclonable functions, true random number generators; and secure embedded and mobile devices.
The course enhances students' preparation to identify, understand and potential propose hardware-solution solutions for the most pressing cyber security problems.
Upon successful completion of this course, students will be able to:
No Required Book
The course prerequisites are Computer Organization and Assembly Language Programming (CSE 230) and/or Computer Architecture I (CSE 420) and/or computer Architecture II (CSE 520)