Hardware Security

开始时间: 11/09/2015 持续时间: 6 weeks

所在平台: Coursera

课程类别: 计算机科学

大学或机构: University of Maryland, College Park(马里兰大学学院园分校)

授课老师: Gang Qu

   

课程主页: https://www.coursera.org/course/hardwaresec

Explore 1600+ online courses from top universities. Join Coursera today to learn data science, programming, business strategy, and more.

课程评论:没有评论

第一个写评论        关注课程

课程详情

Hardware is the root of computation and communication. It is the enabler of any software, algorithm, or communication protocols. All the computation will eventually be carried out by hardware, namely the processor or the circuits.

In this course, we will study security and trust from the hardware perspective. We will start with a short survey of the roles of hardware in security and trust. With all types of dedicated hardware/circuits, known as co-processors, being developed to speed up application specific computations, hardware’s role changes from the enabler to an enhancer. Nowadays, hardware becomes the enforcer for secure systems because it is used to ensure that only the authenticated user and software can access the processor. However, current hardware design flow does not have security as a key design objective. Consequently, we will conduct several case studies where hardware turns into the weakest link in secure systems.

Then we will review the fundamentals of digital logic design and use this as an example to analyze the source of security vulnerabilities and demonstrate how these vulnerabilities can become legitimate security threats. We conclude with the basic principles and practical methods of design for security and trust, as well as a study of the associated design cost.  

Next, we introduce physical attacks to popular digital systems such as smart cards and FPGA-based systems. We will focus on side-channel attacks, which have been demonstrated many times to be able to successfully reveal the secret cryptographic keys stored in the secure systems. These attacks include power analysis, timing attacks, and electromagnetic attacks. Standard countermeasures to these attacks will also be introduced.

Finally we will learn the new hardware security primitives that can help us to build secure systems. We will see how the trust platform module (TPM) works; what is a silicon physical unclonable function (PUF) and why it is useful for system security; what is a hardware Trojan horse and the security threats it brings to the system; why counterfeiting becomes a serious problem for hardware design intellectual property protection.

Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.


课程大纲

Trust in digital system design

  • Vulnerability in combinational logic

  • Vulnerability in sequential logic and finite state machine

  • Hardware Trojan Horse

  • Circuit obfuscation

Side-channel attacks
  • Power analysis

  • Timing attacks

  • ElectroMagnetic analysis     

Physical attacks
  • Fault injection attack

  • Smart card security

  • Field Programmable Gate Array (FPGA) security

Emerging hardware security topics
  • Trust Platform Modules (TPM)

  • Physical Unclonable Functions (PUF)

  • True Random Number Generators (TRNG)

  • RFID tag

  • Counterfeiting

  • Intellectual property protection

课程评论(0条)

Coursera Plus banner featuring three learners and university partner logos

课程简介

In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.

课程标签

安全 硬件 硬件安全

2人关注该课程

主题相关的课程