Description
The MEST Center Team is currently in the process of finalizing the Certificate Program. Registration for the micro-certificates will be live soon; registration is required to receive a certificate, but you can view any of the modules individually below.
Certificates are available to members of MEST only. To access the certificates, you must be logged in to your nanoHUB account, and a MEST group membership is required. The certificates have been specifically developed for US Citizens working in a DoD, Government, or Government-affiliated role. To gain access to the materials, please ensure you have a nanoHUB account registered with your organizational email and follow these steps:
1. Create a nanoHUB account at https://nanohub.org/register/.
2. Request membership in the MEST group at https://nanohub.org/groups/mest.
Security Primitives I -Introduction to Physical Unclonable Functions
Dr. Jim Plusquellic
M32 – Introduction to Physical Unclonable Functions
M33 – PUF Statistics
M34 – NIST Statistical Tests for PUFs
M35 – PUF Classes and Applications
W23 – Hardware Security Primitives: Recent Advancements
W61 – Applications of Embedded, High-Resolution On-Chip Instrumentation for Hardware Security and Trust
Security Primitives II – Physical Unclonable Function Architectures
Dr. Jim Plusquellic
M36 – PUF Architectures I
M58 – PUF Architectures II
M59 – PUF Architectures III
M37 – RO PUF Implementation I
M52 – RO PUF Implementation II
M53 – RO PUF Implementation III
M54 – RO PUF Implementation IV
M58 – PUF Architectures II
M59 – PUF Architectures III
W61 – Applications of Embedded, High-Resolution On-Chip Instrumentation for Hardware Security and Trust
Security Primitives III – True Random Number Generators
Dr. Jim Plusquellic
M76 – TRNG Introduction
M77 – Unified PUF-TRNG Architectures
M78 – TRNG Statistics
System-on-Chip (SoC) Design
Dr. Christophe Bobda
M46 – Development of a Basic System-on-Chip Architecture in FPGA
M47 – Introduction to SoC – System Integration and Interconnects
M22 – Introduction to SoC Modeling with Platform
M68 – Introduction to Petalinux
M69 – Introduction to Systems on-Chip Multi Processor Integration
W60 – Introduction to Systems-on-Chip: Concepts, Architecture, Challenges and Opportunities
W13 – System Level Design of Secured System on Chips
W60 – Introduction to Systems-on-Chip: Concepts, Architecture, Challenges and Opportunities
System-on-Chip (SoC) Verification
Dr. Farimah Farahmandi
M55 – Basics of verification
M48 – Property Based Security Verification
M51 – System level verification using SystemC-UVM
M55 – Basics of verification
W33 – Swatting the Hardware Security Bugs
W41 – Automating Hardware Security Property Generation
W05 – Hardware Security Verification Using Formal Methods
W33 – Swatting the Hardware Security Bugs
W41 – Automating Hardware Security Property Generation
Introduction to Machine Learning
Dr. Li-C Wang
M42 – Overview of Machine Learning
M43 – Domain Specific ML in Microelectronic Field
M75 – Unsupervised Learning for practitioners in the micro-electronics field
W14 – Machine Learning in Silicon Data Analytics
Introduction to Large Language Models (LLMs)
Dr. Li-C Wang
M44 – Introduction to Large Language Models (LLMs)
M45 – Introduction To IEA-Plot
M74 – Origin of Language Models – Self-Supervised Learning
W62 – Harnessing the Power of LLMs in Semiconductor Test Data Analytics
Secure UAV Design
Dr. Md Tauhidur Rahman
M28 – Introduction to UAVs
M29 – Hardware Security of Drones
M30 – UAV Cybersecurity
M31 – Digital Twin of UAV Hardware
M72 – Anti-Drone Systems: Components and Designs
UAV Programming – A Hands-on Experience
Dr. Md Tauhidur Rahman
M81 – UAV Programming
M73 – UAV Programming: Hands-on Experience
M81 – UAV Programming
M82 – UAV Security Assessment
IP Protection using Logic Locking
Dr. Ujjwal Guin
M24 – Different Locking Schemes For Preventing IP Piracy I
M25 – Different Locking Schemes for Preventing IP Piracy II
M09 – Logic Locking Insertion and Assessment
M27 – SAT Attack Complexity Analysis
M02 – Optical Probing Assessment on Logic Locking
M09 – Logic Locking Insertion and Assessment
W30 – Thinking of Logic Locking? Be Aware of the Existing Attacks!
Boolean Satisfiability Attack and Its Use in VLSI Testing
Dr. Ujjwal Guin
M25 – Different Locking Schemes for Preventing IP Piracy II
M26 – Boolean Satisfiability (SAT) Attack with tool demo on Logic Locking
M27 – SAT Attack Complexity Analysis
M27 – SAT Attack Complexity Analysis
M70 – SAT Attack-based Simple Test Pattern Generation Approach
M71 – SAT Attack-based Complex Test Pattern Generation and Identification of Redundant Faults
Asynchronous Design
Dr. Jia Di
M38 – Overview of Asynchronous Logic Circuits and Their Applications in Microelectronics Security and Reliability
M39 – Asynchronous Logic Circuit Design for Extreme Temperatures
M40 – Asynchronous Logic Circuit Design for Radiation Hardening
M41 – Asynchronous Logic Circuit Design for Side-Channel Attack Resilience
M79 – Asynchronous Polymorphic Circuits for Hardware Security
Hardware Trojans
Dr. Mark Tehranipoor
M04 – Hardware Trojan Insertion and Detection
M15 – Hardware Trojan Detection in ICs Using SEM Images
W21 – Closing Information Leakage Channels in Microarchitecture
W28- SPARTA & SPARTA-COTS: A Laser Probing Approach for Sequential Trojan Detection in Integrated Circuits
Counterfeit Detection: Circuit Based
Dr. Mark Tehranipoor
M01 – Recycled FPGA Detection
M13 – Recycled Chip Detection Using RO-based Odometer
W37 – Towards Resilient Approaches for Detecting Recycled ICs
W20 – Counterfeit Detection: Electrical/Logical Test Techniques
W37 – Towards Resilient Approaches for Detecting Recycled ICs
Counterfeit Detection: Imaging Based
Dr. Navid Asadi
M16 – Counterfeit IC detection using Optical Imaging
M18 – Counterfeit PCB Detection Using Optical Imaging I
M19 – Counterfeit PCB Detection Using Optical Imaging II
M20 – Counterfeit PCB Detection Using X-ray Imaging
W11 – Computer Vision for HW Security
Chip Imaging
Dr. Navid Asadi
M14 – Scanning Electron Microscope Training
M17 – X-ray 3D Tomography Training
M21 – Near-field Terahertz Imaging
M66 – Resolution and Texture Analysis
M67 – X-ray Tomography
W27 – Contactless Optical Probing on Integrated Circuits
Fault Injection Attacks
Dr. Farimah Farahmandi
M56 – Fault Injection Attack on AES Chipher
M49 – Detection of Fault Injection Attacks Using TDC Sensor
M56 – Fault Injection Attack on AES Chipher
W47 – Fault Criticality Assessment in AI Accelerators
Micro-architectural Attacks
Dr. Mark Tehranipoor
M46 – Development of a Basic System-on-Chip Architecture in FPGA
M47 – Introduction to SoC – System Integration and Interconnects
M50 – Micro-architectural Attack Detection
W42 – Security Attacks and Defenses of the Micro-Op Cache and the Processor Frontend
W21 – Closing Information Leakage Channels in Microarchitecture
W07 – Architecture Level Vulnerabilities
W21 – Closing Information Leakage Channels in Microarchitecture
W42 – Security Attacks and Defenses of the Micro-Op Cache and the Processor Frontend
Side Channel Attacks
Dr. Farimah Farahmandi
W19 – Practical Side Channel Analysis
W18 – Side Channel Leakage Assessment of Cryptographic Modules
W19 – Practical Side Channel Analysis
W57 – Unlocking the Potential of Impedance Side-Channel: Expanding Horizons in Hardware Security and Privacy
IoT Security
Dr. Md Tauhidur Rahman
M28 – Introduction to UAVs
M29 – Hardware Security of Drones
W09 – Security and Forensics in the IoT Era: From Reverse Engineering to HoteyIot
W55 – New Frontiers of Hardware Security in the IoT Regime
W58 – Firmware Frontiers: Tackling IoT Security from Bare-Metal to BusyBox
Physical Assurance
Dr. Navid Asadi
M14 – Scanning Electron Microscope Training
M17 – X-ray 3D Tomography Training
M21 – Near-field Terahertz Imaging
M16 – Counterfeit IC detection using Optical Imaging
M17 – X-ray 3D Tomography Training
M18 – Counterfeit PCB Detection Using Optical Imaging I
W56- Applying Physical Inspection for Achieving Microelectronics Assurance
M21 – Near-field Terahertz Imaging
W04 – Physical Assurance and Inspection of Electronics
W56- Applying Physical Inspection for Achieving Microelectronics Assurance
Supply chain Security
Dr. Mark Tehranipoor
M09 – Logic Locking Insertion and Assessment
M24 – Different Locking Schemes For Preventing IP Piracy I
W51 – Tracking and Tracing microchips: From wafer, to die to package
W01 – The Art of Digital Design Using FPGAs
W03 – Introduction to Hardware Obfuscation
W08 – Blockchain for Electronics Supply Chain Integrity
W51 – Tracking and Tracing microchips: From wafer, to die to package
AI Accelerator Security
Dr. Li-C Wang
M42 – Overview of Machine Learning
W36 – Hardware Based Attacks and Solutions on Proprietary Deep Learning Models
W44 – Securing Neural Networks Against Side-Channel Attacks with Hardware Masking
W46 – DisruptNet: Integrity Breach of Deep Neural Network Execution