The course introduces students to hardware approaches to cybersecurity. Through lectures, reading assignments and projects, students will gain in-depth knowledge of the role that hardware plays in cybersecurity and computer hardware related attacks and defense in computing systems. Topics covered are: (i) computing systems security requirements: integrity and authentication, among others; (ii) core security techniques: encryption algorithms, key distribution and management; (iii) hardware attacks: hardware Trojans, side-channel attacks, fault attacks, hardware counterfeiting; (iv) trusted hardware primitives: trusted digital system design, circuit obfuscation, trust platform modules, physical unclonable functions, true random number generators; and (v) secure embedded and mobile devices. Student will be introduced to major secure processor architectures or features such as Intel's Software Guard Extensions (SGX) and Trusted Execution Technology (TXT), ARM TrustZone Technology and derived processor architectures, MIT Aegis Secure Processor, Apple Secure Enclave Processor (SEP), and BU Hermes and Sphinx Architectures.
The course will enhance students' preparation to identify, understand and potential propose hardware-as-root-of-trust solutions for the most pressing cyber security problems. Upon successful completion of this course, students will be able to:
M. Tehranipoor and C. Wang, Introduction to Hardware Security and Trust, Springer, 2011 (Recommended)