Subject Area | Computer Hardware and Architecture |
---|---|
Semester | Semester 7 – Fall |
Type | Elective |
Teaching Hours | 4 |
ECTS | 6 |
Prerequisites |
|
Course Director |
|
Course Instructor |
|
- Introduction to hardware security.
- Hardware trojan ecosystem.
- Detailed description of the types of hardware trojans.
- Methods of implementing and importing hardware trojans in integrated circuits.
- Identification/detection methods.
- Expansion of testing techniques.
- Circuit techniques to assist in the identification of malicious hardware.
- Simulation techniques for the identification of malicious hardware.
- Identification methods using deep learning.
- Presentation and analysis of real cases.
- Overview of modern research directions.
- Lab: Introduction and identification of hardware trojans in a circuit either implemented in FPGA or in simulation.
The course is an overview of hardware security issues of integrated circuits.
Upon successful completion of the course the student will be able to:
- Have an understanding of key definitions and critical issues related to hardware security.
- Have specialized knowledge in advanced topics of modern integrated circuit industry.
- Explain and solve problems related to the structure, recognition and mitigation of security issues in modern integrated circuits, or comment on issues from prominent publications in the field.
- Implement identification strategies in conjunction with existing integrated circuit testing methods.
- Collaborate with colleagues to create and present a group project on a topic related to the design and implementation of a hardware trojans or its identification methodology, if he/she chooses a group project.
- Seek and study contemporary literature in internationally recognized journals and conferences, explain and evaluate satisfactorily publications, as well as present his/her conclusions to the class, if he/she chooses individual work.