EC 700 Hardware and Systems Security

Fall 2018


Class Syllabus

The general format of the course consists of some regular lectures, presentation sections, and a project.
Grading Policy
  • Participation: 10%
  • Reading reports: 25%
  • Presentations: 25%
  • Project: 40%
  • Grades will be posted on Blackboard.
  • Grades will be assigned two ways:
    • >90 [A], >80 [B], >70 [C], >60 [D]
    • Curved according to the class median. Here your relative score is what really matters, rather than the objective scores above.
Missed Class Policy

Students must contact the instructor prior to missing an exam to schedule a makeup exam. Makeup exams will only be scheduled following an exam in cases of documented emergencies.

Late Submission Policy

Presentations and project deliverables submitted after the due date/time are considered late and will not be graded. Late submissions will only be graded in cases of documented emergencies.

Plagiarism

Discussion of course material and collaboration with other students is encouraged but each student must write/type and submit his/her own solution. Your essays, code and proofs (if applicable) should never contain sections which are identical to the submission of another student, past or present. Submitted work must be entirely that of the student(s) whose name(s) appear(s) on the submission and not solicited in any way from others. Violation of these policies can result in automatic failure of the course.

Please refer to the Boston University’s policy on academic dishonesty.
Tentative Schedule
Monday Wednesday

Sep 3

Labor Day

M. Kinsy

Sep 5 - L01

Introduction to cybersecurity: Cyber attacks examples

M. Kinsy

Sep 10 - L02

Application level attacks: Code injection, Buffer Overflow, Control-Flow Hijacking

M. Kinsy

Sep 12 - L03

Classic and Modern encryption algorithms: AES, RSA, Hash, MAC, digital signatures, etc.

M. Kinsy

Sep 17 - L04

Hardware security primitives: Physical unclonable functions, oblivious RAM, circuit obfuscation

Reading Report 1 DUE

M. Kinsy

Sep 19 - L05

Distributed trustworthy systems: Distributed key management, authentication, confidentiality

M. Kinsy

Sep 24 - L06

Secure computing: Secure multiparty computation, homomorphic computation

M. Kinsy

Sep 26 - L07

Secure Architecture Design Concepts: Isolation, obfuscation, attestation

M. Kinsy

Oct 1st - L08

Memory integrity, cache side channel, secure boot, trusted OS

M. Kinsy

Reading Report 2 DUE

Presentations

Oct 3rd - L09

Software Guard Extensions (SGX) and Trusted Execution Technology (TXT)

M. Kinsy

Oct 9 - L10

Virtual Monday

ARM TrustZone Technology and derived processor architectures

M. Kinsy

Oct 10 - L11

Apple Secure Enclave Processor (SEP) and underlining principles

M. Kinsy

Oct 15 - L12

Secure processor design - MIT Aegis, Ascend, and Sanctum

M. Kinsy

Reading Report 3 DUE

Presentations

Oct 17 - L13

Secure processor design - BU Hermes and Sphinx

M. Kinsy

Oct 22 - L14

Secure Machine Learning Accelerators

M. Kinsy

Oct 24 - L15

Issues related to secure IC supply chain management

M. Kinsy

Reading Report 4 DUE

Presentations

Oct 29

Project Activities

M. Kinsy

Oct 31

Project Activities

M. Kinsy