Course Description:
The end of Moore’s law is changing the landscape of IC design and fabrication. In parallel, the field and threat space of hardware security is rapidly evolving. This course expands on the foundational knowledge and concepts provided by the Introduction to Hardware Security and Trust course through lectures and projects in order to understand and investigate these new challenges.
Advanced Topics and Sub-Topics:
Part 1: Hardware Obfuscation
- Metrics.
- Logic Locking and IC Camo.
- Attacks and Countermeasures.
- FSM Obfuscation.
- Key Exchange/Management.
- IP Encryption
- Split Manufacturing & 2.5/3D.
Part 2: Emerging Challenges
- IoT and Cloud.
- Analog/Mixed Signal (AMS).
- Nano and Beyond CMOS.
- FPGA Pitfalls.
- CAD/EDA Tool Pitfalls.
- SoC Design Rule Checks.
Part 3: Current State-of-the-Art
- Automated Counterfeit Detection.
- Counterfeit Avoidance for Memories & FPGAs.
- Hardware Trojan Prevention.
- Machine Learning Attacks on PUFs.
- State-of-the-Art PUF design.
- Probing and Anti-probing.