关键词 > EEE4714/EEE5716

EEE4714/EEE5716 Introduction to Hardware Security and Trust Fall 2023

发布时间:2023-09-06

Hello, dear friend, you can consult us at any time if you have any questions, add WeChat: daixieit

Introduction to Hardware Security and Trust

EEE4714/EEE5716

Class Periods: Tuesday (07) and Thursday (07-08)

Academic Term: Fall 2023

Instructor/coordinator: Dr. Farimah Farahmandi

(Some lectures will be given by Dr. Tehranipoor)

Office Location

Virtual/Zoom

Office Hours

Tuesdays 3-4pm

Class Location

NEB 202

Telephone

Email Only

Email

[email protected]

Website

http://farimah.ece.ufl.edu

Catalog Description

Fundamentals of hardware security and trust for integrated circuits and systems, cryptographic hardware, invasive and non-invasive attacks, side-channel attacks, physically unclonable functions (PUFs), true random number generation (TRNG), watermarking of Intellectual Property (IP) blocks, FPGA security, counterfeit ICs, hardware Trojans in IP cores and ICs. Lecture. Credits 3.

Pre-requisites

EEL 3701: Digital Logic and Computer Systems

Course Objectives

This course will cover the following topics: Cryptographic processor and processing overhead analysis, physical and invasive attacks, side-channel attacks, physically unclonable functions, hardware-based true random number generators, watermarking of Intellectual Property (IP) blocks, FPGA security, passive and  active metering for prevention of piracy, access control, hardware Trojan detection and isolation in IP cores and integrated circuits (ICs). The course is largely self-contained. Background on digital design would be sufficient. Introductory lectures will cover basic background on cryptography, authentication, secret sharing, VLSI design, test and verification. The main goals for this course are:

·      Learning the state-of-the-art security methods and primitives

·      Integration of security as a design metric, not as an afterthought

·      Better understanding of attacks and providing countermeasures against them

·      A hands-on learning approach, via projects, homework, and review assignments

Supervised Teaching Assistants (STAs)

Rafid Muttaki, m.mut[email protected] (Tue 11 am- 12 pm)

Sajeed Mohammad, [email protected] (Wed 3-4pm)

Sami Islam, [email protected] (Thur 4-5pm)

The STAs will lead about half of the Tuesday lectures and will assist with evaluation of student modules and final projects.

Meeting Times (Fall 2023 class is held 100% in person, Tuesday (07) and Thursday (07-08))

Meeting Location (for In-campus students) - NEB  202

Textbooks and Software Required

Textbook:

S. Bhunia and M. Tehranipoor, Hardware Security: A Hand-on Training Approach, Morgan Kauffman, 2018

Reference Book:

M. Tehranipoor and C. Wang (Eds.), Introduction to Hardware Security and Trust, Springer, 2011

Software: Xilinx ISE package, Synopsys Verilog simulation package and HSpice, Cadence Design System, Programming and Scripting Software (Matlab, Python, C/C++)

Recommended Reading and Videos

Reading

Ross J. Anderson. Security Engineering: A guide to building dependable distributed systems. John Wiley and

Sons, 2001

Matt Bishop , Computer Security: Art and Science, Addison-Wesley,  2003

William Stallings. Cryptography and Network Security, Fourth edition, 2007

The Hunt for the Kill Switch

Hardware Trojan (computing)

Defense Science Board Task Force On High Performance Microchip Supply

Old Trick Threatens the Newest Weapons

A Survey of Hardware Trojan taxonomy and Detection

Detecting malicious inclusions in secure hardware: Challenges and Solutions

FPGA Design Security Bibliography

Supergeek pulls off 'near impossible' crypto chip hack

Security through obscurity

Trust-Hub

Videos

•    What's inside a microchip?http://www.youtube.com/watch?v=GdqbLmdKgw4

•    Zoom Into a Microchiphttp://www.youtube.com/watch?v=Fxv3JoS1uY8

•    Public Key Cryptography: RSA Encryption:http://www.youtube.com/watch?v=wXB-V_Keiu8

•    Counterfeit Electronics Could Be Dangerous, Funding Nefarious People

http://www.youtube.com/watch?v=dbZiUe6guxc

•    How Computers and Electronics Are Recycledhttp://www.youtube.com/watch?v=Iw4g6H7alvo

•    Counterfeit Electronic Components Processhttp://www.youtube.com/watch?v=5vN_7NJ4qYA

•    Counterfeit Inspectionhttp://www.youtube.com/watch?v=MbQUvu2LN6o

•    Gold from waste circuit electronicshttp://www.youtube.com/watch?v=ZkhOuNvkuu8

•    Tarnovsky Deconstruct Processorhttps://www.youtube.com/watch?v=w7PT0nrK2BE

•   AES cipher visualization (linkhttps://www.youtube.com/watch?v=mlzxpkdXP58)

Course Outline

Week

Tuesday Lecture

Instructor

Thursday Lecture

Instructor

Week 1 (Aug 22)

Syllabus, Ethics, Introduction to

hardware security and trust, Emerging applications and the new threats

FF

Week 2 (Aug 29)

Cont. Introduction to hardware security

FF

Introduction to Cryptography

MT

Week 3 (Sept 5)

Introducing Tuesday Activities + VHDL/Verilog & FPGA

Tutorial

STA

Basics of VLSI Design and Test

FF

Week 4 (Sept 12)

VHDL/Verilog & FPGA Tutorial

STA

Basics of VLSI Design and Test

FF

Week 5 (Sept 19)

Project Description

STA

Security Based on PUFs and TRNGs

FF

Week 6 (Sept 26)

VHDL/Verilog & FPGA Tutorial

STA

Hardware Metering

FF

Week 7 (Oct 3)

CAD Tools

STA

Watermarking of HW IPs

FF

Week 8 (Oct 10)

Student Presentations (Students should record their presentation   and share to be viewed by others prior to assigned dates)

FF/STA

Physical Attacks and Fault Injection Attacks

FF

Week 9 (Oct 17)

Student Presentations

FF/

STA

Midterm

FF/STA

Week 10 (Oct 24)

Student Presentations

FF/

STA

Hardware Trojans: IC Trust

(Taxonomy and Detection)

FF

Week 11 (Oct 31)

Student Presentations

FF/

STA

Hardware Trojans: IP Trust

(Detection) + Design for Hardware Trust

FF

Week 12 (Nov 7)

Student Presentations

FF/

STA

Counterfeit Detection and Avoidance

FF

Week 13 (Nov 14)

Student Presentations

FF/

STA

Basics of PCB Security + FGPA Security

FF

Week 14 (Nov 21)

Student Presentations

FF/

STA

Holiday

Week 15 (Nov 28)

Student Presentations

FF/

STA

Side Channel Attacks and

Countermeasures, Countermeasures for Embedded Microcontrollers

FF

Week 16 (Dec 5)

Final Class - Review Final Exam

FF/

STA

Final Exam

12/13/2023 @ 3:00 PM - 5:00 PM

Dec 18

Grades due

Attendance and Expectations

Format: The course is comprised of weekly lectures, 3-4 HW assignments, student paper presentation module, and a final project. In addition, there will be two exams (midterm + final) and surprise pop quizzes.

Students must submit individual work individually on each module and as a team of 3 on final project. You are encouraged to work together on homework assignments and share ideas on lab assignments.

However, you are not allowed to copy or duplicate any lab material (code, drawings, etc.) from another student.  It will be considered cheating and will be dealt with in a severe manner.  See Section 16 on Honesty Policy.

The final project will require implementation of a hardware security primitive or attack on an FGPA based on several conference and journal papers distributed to the teams. The team’s work will be evaluated

through demonstration on several benchmarks. Each group will prepare a presentation, demonstration of the project, and final report. The final report will discuss challenges met, present in-depth analysis of the approaches implemented by the team, etc.

The EDGE students may complete the paper presentation and final project module individually or as a team of 3. A separate instruction set will be issued for individual paper presentations and projects.

Grading-methods of evaluation

. Exams                                      40% (20% mid-term, 20% final (comprehensive, more emphasis on post- mideterm topics))

. HW Assignments                      15%

. Final Project                           20%

. Oral Paper Presentation          15%

. Quiz                                        10%

Grading Scale

Grading scale for the course: ≥90 A, ≥87 A-, ≥80 B, ≥77 B-, ≥ 70 C,≥ 67 C-,≥ 60 D, ≥ 57 D-,<57 F

Late submission

Late assignment submissions will not be accepted unless prior arrangements have been made between the student and TA/Professor.

Accommodation for Students with Disabilities

Students requesting classroom accommodation must first register with the Dean of Students Office.  That office will provide the student with documentation that he/she must provide to the course instructor when requesting accommodation.

UF Counseling Services

Resources are available on-campus for students having personal problems or lacking clear career and academic goals.  The resources include:

University Counseling Center, 301 Peabody Hall, 392- 1575, Personal and Career Counseling. SHCC mental Health, Student Health Care Center, 392- 1171, Personal and Counseling.

Center for Sexual Assault/Abuse Recovery and Education (CARE), Student Health Care Center, 392- 1161, sexual assault counseling.

Career Resource Center, Reitz Union, 392- 1601, career development assistance and counseling.

Students Requiring Accommodations

Students with disabilities requesting accommodations should first register with the Disability Resource Center  (352-392-8565, https://www.dso.ufl.edu/drc)  by  providing  appropriate  documentation.  Once registered, students will receive an accommodation letter which must be presented to the instructor when requesting accommodation. Students with disabilities should follow this procedure as early as possible in the semester.

Course Evaluation

Students are expected to provide professional and respectful feedback on the quality of instruction in this  course by completing course evaluations online via GatorEvals. Guidance on how to give feedback in a professional and respectful manner is available at https://gatorevals.aa.ufl.edu/students/. Students will be notified when the evaluation period opens, and can complete evaluations through the email they receive from GatorEvals, in their Canvas course menu under GatorEvals, or via https://ufl.bluera.com/ufl/. Summaries of course evaluation results are available to students at https://gatorevals.aa.ufl.edu/public-results/.