• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
MEST Center

MEST Center

National Microelectronic Security Training Center

  • Home
  • About Us
    • Highlights
    • Advisory Board
    • Careers
  • Contributors
  • Trainings & Schedule
    • Join us on nanoHUB!
    • Webinars
    • On-Site and Virtual Training
    • On-Campus Training
    • Certificate Programs
      • Micro Certificates
      • Macro Certificates
    • Courses
    • Modules
  • Contact Us

Side-Channel Attack

December 12, 2025 by Limor Herb

Date/Time
Date(s) - 12/12/2025 - 05/31/2030
12:00 AM
Add to Google Calendar or iCal/Outlook Calendar


Instructor 

Dr. Md Tauhidur Rahman, Assistant Professor, Electrical and Computer Eng, Florida International University, Miami, Florida

Learning Objectives

This module provides a foundational understanding of side-channel analysis, a powerful technique used to extract sensitive information from devices by exploiting their physical behavior. It is used for various purposes—from attacking cryptographic implementations by revealing secret keys or user inputs, to defending systems through anomaly detection, firmware validation, and hardware integrity monitoring. By examining how physical signals such as power consumption, electromagnetic emissions, and timing variations correlate with internal data processing, learners will explore both the offensive capabilities and defensive potential of side-channel techniques across modern computing systems.

This certificate program is designed to equip learners with a comprehensive understanding of side-channel analysis through three integrated units.

  • Unit 1: Introduction to Side-channels: this unit introduces the fundamental concepts, types, and applications of side-channels, highlighting how physical signals can leak sensitive information and be used for both attacks and system monitoring. By the end of this unit, learners will understand how physical signals from devices can leak sensitive information. They will learn about different types of side-channels like power, timing, and electromagnetic signals. Learners will also see how these signals are used in both attacks and system protection.
  • Unit 2: Side-channel Attacks: Hands-on Experience: this unit provides hands-on experience with side-channel attacks, where students analyze power-side-channel data and interpret them to extract cryptographic secrets and understand real-world vulnerabilities.  In this unit, learners will learn how to analyze power-signal data to extract secret keys from cryptographic encryption using Correlation Power Analysis.
  • Unit 3: Side-channel Attacks: Countermeasures: this unit focuses on defense mechanisms against side-channel attacks. Learners will discover how to design and apply countermeasures to protect hardware systems from side-channel threats. They will explore common defense techniques such as noise injection, constant-time algorithms, and hardware shielding. Additionally, they will gain practical experience by implementing these defenses against the side-channel attacks covered in Unit 2.
  • Unit 4: Research Series on Side-Channel Attacks: It contains three lectures on practical applications of Side-Channel Attacks.

Together, these modules prepare learners to assess, exploit, and protect systems in the context of physical-layer security.

Target Audience

Designed for U.S. citizens working in the Department of War, Government, or Government-affiliated employees, industry, as well as college students and faculty. Must register with your organizational email, and will be notified of acceptance within one week of the course start date

Biography

Dr. Tauhidur Rahman is an Assistant Professor in the Department of Electrical and Computer Engineering at Florida International University (FIU). He obtained his Ph.D. in Computer Engineering from the University of Florida in 2017 (advised by Dr. Mark Tehranipoor). He is the recipient of NSF CRII and the director of the SeRLoP (Security, Reliability, Low-power, and Privacy) Research lab. His research interests include hardware security and trust, side-channel analysis, and embedded security. His research is funded by the National Science Foundation (NSF), the National Security Agency (NSA), the Department of Defense (DoD), and CyberFlorida.



Registration

Tickets

By clicking to register you are not automatically enrolled in the course. Selected applicants will be notified.

Registration Information

I am a US citizen
I am not a US citizen

I am working in a DoD, Government, or Government - affiliated role.
I am a member of the MEST nanoHUB group.
I am a SCALE student.
none of the above.

An email from MEST
An email to newsletter from nanoHUB
LinkedIn post
MEST instructor or staff
Co-worker / colleague
Supervisor / manager
Other

Strongly agree
Agree
Neither agree not disagree
Disagree
Strongly disagree

Strongly agree
Agree
Neither agree not disagree
Disagree
Strongly disagree

Strongly agree
Agree
Neither agree not disagree
Disagree
Strongly disagree

Booking Summary

1
x Micro Certificate Registration Application
$0.00
Total Price
$0.00

Stay in touch!

Join our LISTSERV

Join us on nanoHUB

  • LinkedIn
  • Email MEST Center
  • Join us on nanoHUB!