Offered in Fall, Prerequisite: EECS 388 and Upper-Level EECS eligibility
Course Summary: This course will investigate various security and trust issues related to integrated circuits and systems during their design and manufacturing process, as well as during field operation. A wide range of threats including piracy, reverse engineering, hardware Trojan insertion, side-channel attack, and various invasive non-invasive attacks will be introduced. Potential hardware and software-based countermeasures to detect and prevent these attacks will be studied. Implementation of design-time solutions like physically unclonable functions (PUFs), true random number generator (TRNG), security monitors, hardware obfuscation, and many others will be covered.
Curse objectives:
Understanding the broad range of security threats pertaining to hardware including Trojan insertion, tampering, piracy, reverse engineering, counterfeiting, and side-channel attacks.
Learning about the state-of-the-art countermeasures against the attacks such as design-for-security, verification, runtime monitoring, obfuscation, watermarking metering, and security primitives.
Having perspective on a future career in hardware-oriented cybersecurity.
Getting familiar with the software and hardware tools for implementing attacks and countermeasures.
Learning to summarize and present technical work (oral presentation).
Improving the expertise in writing technical reports and research papers.