Hardware security sits at the intersection of cryptographic engineering and hardware design. It includes hardware-root-of-trust design techniques, access control, secure multi-party computation, code authenticity techniques, secure key storage, secure execution, side-channel analysis, obfuscation methods, and IC supply chain risks. The Course introduces students to these hardware security concepts through the design of a secure multi-core processor. Using an out-of-order RISC-V processor template, students examine micro-architecture side-channel vulnerabilities, defenses, and trusted execution extensions and micro-architecture modifications.
The course will enhance students' preparation to identify, understand and potential propose hardware-as-root-of-trust solutions for the most pressing cyber security problems. Upon successful completion of this course, students will be able to:
M. Tehranipoor and C. Wang, Introduction to Hardware Security and Trust, Springer, 2011 (Recommended)