CS60004 : Hardware Security
CS60004 | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Course name | Hardware Security | ||||||||||||||||||||||||
Offered by | Computer Science & Engineering | ||||||||||||||||||||||||
Credits | 3 | ||||||||||||||||||||||||
L-T-P | 3-0-0 | ||||||||||||||||||||||||
Professor(s) | Sarani Bhattacharya | ||||||||||||||||||||||||
Previous Year Grade Distribution | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
Semester | Spring |
Syllabus[edit | edit source]
Syllabus mentioned in ERP[edit | edit source]
Overview of Different Issues of Hardware Security
Preliminaries: Algebra of Finite Fields, Basics of the Mathematical Theory of Public Key Cryptography, Basics of Digital Design on Field-programmable Gate Array (FPGA), Classification using Support Vector Machines (SVMs)
Useful Hardware Security Primitives: Cryptographic Hardware and their Implementation, Optimization of Cryptographic Hardware on FPGA, Physically Unclonable Functions (PUFs), PUF Implementations, PUF Quality Evaluation, Design Techniques to Increase PUF Response Quality
Side-channel Attacks on Cryptographic Hardware: Basic Idea, Current-measurement based Side-channel Attacks (Case Study: Kocher's Attack on DES), Design Techniques to Prevent Side-channel Attacks, Improved Side-channel Attack Algorithms (Template Attack, etc.), Cache Attacks
Testability and Verification of Cryptographic Hardware: Fault-tolerance of Cryptographic Hardware, Fault Attacks, Verification of Finite-field Arithmetic Circuits
Modern IC Design and Manufacturing Practices and Their Implications: Hardware Intellectual Property (IP) Piracy and IC Piracy, Design Techniques to Prevent IP and IC Piracy, Using PUFs to prevent Hardware Piracy, Model Building Attacks on PUFs (Case Study: SVM Modeling of Arbiter PUFs, Genetic Programming based Modeling of Ring Oscillator PUF)
Hardware Trojans: Hardware Trojan Nomenclature and Operating Modes, Countermeasures Such as Design and Manufacturing Techniques to Prevent/Detect Hardware Trojans, Logic Testing and Side-channel Analysis based Techniques for Trojan Detection, Techniques to Increase Testing Sensitivity Infrastructure Security: Impact of Hardware Security Compromise on Public Infrastructure, Defense Techniques (Case Study: Smart-Grid Security)
Note: The actual curriculum may vary depending on the professor teaching the course.
Concepts taught in class[edit | edit source]
Student Opinion[edit | edit source]
Attending the classes regularly will surely help. A great NPTEL playlist is available that covers most of the major topics.
Spring 2023[edit | edit source]
Taught by Prof. Sarani Bhattacharya. This is a 3-credit course with no lab component. However, some additional classes were organised to give a hands-on experience. A smaller number of students are enrolled in the course majorly PG and RS with a few UG students. The grading is based on mid-semester, and end-semester examinations, along with 1 assignment (pre-midsem) and a term project (post-endsem). The exams are relatively easy to score with great focus on the fundamental concepts.
How to Crack the Paper[edit | edit source]
Classroom resources[edit | edit source]
Additional Resources[edit | edit source]
Debdeep Mukhopadhyay and Rajat Subhra Chakraborty, "Hardware Security: Design, Threats, and Safeguards", CRC Press