Secure Processor Microarchitecture
With the growing threat of cyber attacks, the prominence of processor microarchitecture as an efficient means to address the threat has grown immensely. On the other hand, computer hardware is often at the epicenter of a range of new threats that exploit vulnerabilities inherent in the processor design. This course explores the good and the bad side of computer hardware in the cyber security context.
This course comprise of two parts.
Part 1. Attacks based on vulnerabilities in the computer hardware
Power side-channel attacks
Fault Attacks
Micro-architectural attacks
Part 2: Hardware centric strategies to improve computer security
Trusted Execution Environments
Trusted platform modules
Malware detection from hardware
Instructor
TAs
Keerthi K (RISE Lab)
Reetwik Das (RISE Lab)
Prerequisites
computer organisation and architecture
Logistics
Classes will be held from 25/Feb/2021 in Slot A.
Monday : 8:00 - 8:50 AM
Tuesday : 12:00 - 12:50 PM (will be used for Lab and Tutorials)
Thursday: 11:00 - 11:50 AM
Friday: 10:00 - 10::50 AM
We will be using Microsoft Teams for communication. Please create accounts with your smail.iitm.ac.in email ids.