关键词 > EEE4714/EEE5716
EEE4714/EEE5716 Introduction to Hardware Security and Trust Fall 2023
发布时间:2023-09-06
Hello, dear friend, you can consult us at any time if you have any questions, add WeChat: daixieit
Introduction to Hardware Security and Trust
EEE4714/EEE5716
Class Periods: Tuesday (07) and Thursday (07-08)
Academic Term: Fall 2023
Instructor/coordinator: Dr. Farimah Farahmandi
(Some lectures will be given by Dr. Tehranipoor)
Office Location |
Virtual/Zoom |
Office Hours |
Tuesdays 3-4pm |
Class Location |
NEB 202 |
Telephone |
Email Only |
|
|
Website |
Catalog Description
Fundamentals of hardware security and trust for integrated circuits and systems, cryptographic hardware, invasive and non-invasive attacks, side-channel attacks, physically unclonable functions (PUFs), true random number generation (TRNG), watermarking of Intellectual Property (IP) blocks, FPGA security, counterfeit ICs, hardware Trojans in IP cores and ICs. Lecture. Credits 3.
Pre-requisites
EEL 3701: Digital Logic and Computer Systems
Course Objectives
This course will cover the following topics: Cryptographic processor and processing overhead analysis, physical and invasive attacks, side-channel attacks, physically unclonable functions, hardware-based true random number generators, watermarking of Intellectual Property (IP) blocks, FPGA security, passive and active metering for prevention of piracy, access control, hardware Trojan detection and isolation in IP cores and integrated circuits (ICs). The course is largely self-contained. Background on digital design would be sufficient. Introductory lectures will cover basic background on cryptography, authentication, secret sharing, VLSI design, test and verification. The main goals for this course are:
· Learning the state-of-the-art security methods and primitives
· Integration of security as a design metric, not as an afterthought
· Better understanding of attacks and providing countermeasures against them
· A hands-on learning approach, via projects, homework, and review assignments
Supervised Teaching Assistants (STAs)
Rafid Muttaki, m.mut[email protected] (Tue 11 am- 12 pm)
Sajeed Mohammad, [email protected] (Wed 3-4pm)
Sami Islam, [email protected] (Thur 4-5pm)
The STAs will lead about half of the Tuesday lectures and will assist with evaluation of student modules and final projects.
Meeting Times (Fall 2023 class is held 100% in person, Tuesday (07) and Thursday (07-08))
Meeting Location (for In-campus students) - NEB 202
Textbooks and Software Required
Textbook:
S. Bhunia and M. Tehranipoor, Hardware Security: A Hand-on Training Approach, Morgan Kauffman, 2018
Reference Book:
M. Tehranipoor and C. Wang (Eds.), Introduction to Hardware Security and Trust, Springer, 2011
Software: Xilinx ISE package, Synopsys Verilog simulation package and HSpice, Cadence Design System, Programming and Scripting Software (Matlab, Python, C/C++)
Recommended Reading and Videos
Reading
• Matt Bishop , Computer Security: Art and Science, Addison-Wesley, 2003
• William Stallings. Cryptography and Network Security, Fourth edition, 2007
• The Hunt for the Kill Switch
• Defense Science Board Task Force On High Performance Microchip Supply
• Old Trick Threatens the Newest Weapons
• A Survey of Hardware Trojan taxonomy and Detection
• Detecting malicious inclusions in secure hardware: Challenges and Solutions
• FPGA Design Security Bibliography
• Supergeek pulls off 'near impossible' crypto chip hack
Videos
• What's inside a microchip?http://www.youtube.com/watch?v=GdqbLmdKgw4
• Zoom Into a Microchiphttp://www.youtube.com/watch?v=Fxv3JoS1uY8
• Public Key Cryptography: RSA Encryption:http://www.youtube.com/watch?v=wXB-V_Keiu8
• Counterfeit Electronics Could Be Dangerous, Funding Nefarious People
http://www.youtube.com/watch?v=dbZiUe6guxc
• How Computers and Electronics Are Recycledhttp://www.youtube.com/watch?v=Iw4g6H7alvo
• Counterfeit Electronic Components Processhttp://www.youtube.com/watch?v=5vN_7NJ4qYA
• Counterfeit Inspectionhttp://www.youtube.com/watch?v=MbQUvu2LN6o
• Gold from waste circuit electronicshttp://www.youtube.com/watch?v=ZkhOuNvkuu8
• Tarnovsky Deconstruct Processorhttps://www.youtube.com/watch?v=w7PT0nrK2BE
• AES cipher visualization (linkhttps://www.youtube.com/watch?v=mlzxpkdXP58)
Course Outline
Week |
Tuesday Lecture |
Instructor |
Thursday Lecture |
Instructor |
Week 1 (Aug 22) |
|
|
Syllabus, Ethics, Introduction to hardware security and trust, Emerging applications and the new threats |
FF |
Week 2 (Aug 29) |
Cont. Introduction to hardware security |
FF |
Introduction to Cryptography |
MT |
Week 3 (Sept 5) |
Introducing Tuesday Activities + VHDL/Verilog & FPGA Tutorial |
STA |
Basics of VLSI Design and Test |
FF |
Week 4 (Sept 12) |
VHDL/Verilog & FPGA Tutorial |
STA |
Basics of VLSI Design and Test |
FF |
Week 5 (Sept 19) |
Project Description |
STA |
Security Based on PUFs and TRNGs |
FF |
Week 6 (Sept 26) |
VHDL/Verilog & FPGA Tutorial |
STA |
Hardware Metering |
FF |
Week 7 (Oct 3) |
CAD Tools |
STA |
Watermarking of HW IPs |
FF |
Week 8 (Oct 10) |
Student Presentations (Students should record their presentation and share to be viewed by others prior to assigned dates) |
FF/STA |
Physical Attacks and Fault Injection Attacks |
FF |
Week 9 (Oct 17) |
Student Presentations |
FF/ STA |
Midterm |
FF/STA |
Week 10 (Oct 24) |
Student Presentations |
FF/ STA |
Hardware Trojans: IC Trust (Taxonomy and Detection) |
FF |
Week 11 (Oct 31) |
Student Presentations |
FF/ STA |
Hardware Trojans: IP Trust (Detection) + Design for Hardware Trust |
FF |
Week 12 (Nov 7) |
Student Presentations |
FF/ STA |
Counterfeit Detection and Avoidance |
FF |
Week 13 (Nov 14) |
Student Presentations |
FF/ STA |
Basics of PCB Security + FGPA Security |
FF |
Week 14 (Nov 21) |
Student Presentations |
FF/ STA |
Holiday |
|
Week 15 (Nov 28) |
Student Presentations |
FF/ STA |
Side Channel Attacks and Countermeasures, Countermeasures for Embedded Microcontrollers |
FF |
Week 16 (Dec 5) |
Final Class - Review Final Exam |
FF/ STA |
|
|
Final Exam |
12/13/2023 @ 3:00 PM - 5:00 PM |
|||
Dec 18 |
Grades due |
Attendance and Expectations
Format: The course is comprised of weekly lectures, 3-4 HW assignments, student paper presentation module, and a final project. In addition, there will be two exams (midterm + final) and surprise pop quizzes.
Students must submit individual work individually on each module and as a team of 3 on final project. You are encouraged to work together on homework assignments and share ideas on lab assignments.
However, you are not allowed to copy or duplicate any lab material (code, drawings, etc.) from another student. It will be considered cheating and will be dealt with in a severe manner. See Section 16 on Honesty Policy.
The final project will require implementation of a hardware security primitive or attack on an FGPA based on several conference and journal papers distributed to the teams. The team’s work will be evaluated
through demonstration on several benchmarks. Each group will prepare a presentation, demonstration of the project, and final report. The final report will discuss challenges met, present in-depth analysis of the approaches implemented by the team, etc.
The EDGE students may complete the paper presentation and final project module individually or as a team of 3. A separate instruction set will be issued for individual paper presentations and projects.
Grading-methods of evaluation
. Exams 40% (20% mid-term, 20% final (comprehensive, more emphasis on post- mideterm topics))
. HW Assignments 15%
. Final Project 20%
. Oral Paper Presentation 15%
. Quiz 10%
Grading Scale
Grading scale for the course: ≥90 A, ≥87 A-, ≥80 B, ≥77 B-, ≥ 70 C,≥ 67 C-,≥ 60 D, ≥ 57 D-,<57 F
Late submission
Late assignment submissions will not be accepted unless prior arrangements have been made between the student and TA/Professor.
Accommodation for Students with Disabilities
Students requesting classroom accommodation must first register with the Dean of Students Office. That office will provide the student with documentation that he/she must provide to the course instructor when requesting accommodation.
UF Counseling Services
Resources are available on-campus for students having personal problems or lacking clear career and academic goals. The resources include:
University Counseling Center, 301 Peabody Hall, 392- 1575, Personal and Career Counseling. SHCC mental Health, Student Health Care Center, 392- 1171, Personal and Counseling.
Center for Sexual Assault/Abuse Recovery and Education (CARE), Student Health Care Center, 392- 1161, sexual assault counseling.
Career Resource Center, Reitz Union, 392- 1601, career development assistance and counseling.
Students Requiring Accommodations
Students with disabilities requesting accommodations should first register with the Disability Resource Center (352-392-8565, https://www.dso.ufl.edu/drc) by providing appropriate documentation. Once registered, students will receive an accommodation letter which must be presented to the instructor when requesting accommodation. Students with disabilities should follow this procedure as early as possible in the semester.
Course Evaluation
Students are expected to provide professional and respectful feedback on the quality of instruction in this course by completing course evaluations online via GatorEvals. Guidance on how to give feedback in a professional and respectful manner is available at https://gatorevals.aa.ufl.edu/students/. Students will be notified when the evaluation period opens, and can complete evaluations through the email they receive from GatorEvals, in their Canvas course menu under GatorEvals, or via https://ufl.bluera.com/ufl/. Summaries of course evaluation results are available to students at https://gatorevals.aa.ufl.edu/public-results/.