ECE 525: Hardware-Oriented Security and Trust

advertisement
ECE 525: Hardware-Oriented Security and Trust
Course:
ECE 525: Hardware-Oriented Security and Trust, Spring 2012. 3 credits.
Course Instructor:
Prof. Jim Plusquellic
Office: ECE 236C, Telephone: 7-0785
Email: jimp@ece.unm.edu, Home Page: http://www.ece.unm.edu/~jimp/
Office Hours: by appointment
Course Description
This course will investigate recent technology developments for the design and evaluation
of secure and trustworthy hardware. Technology is required to ensure that a trustworthy
circuit module remains secure during its entire lifecycle from design to manufacturing to
deployment and operation. First, there is need for a design flow that can produce trustworthy circuits, and that will protect the hardware platform against tampering and the unauthorized extraction of information. Second, the manufacturing, integration and
deployment of a trustworthy integrated circuit needs protection against malicious design
modifications, or Trojans. Techniques are needed to detect the presence of Trojans in fabricated devices, and to locate them in the design. Third, there is need to implement support
for trust at the hardware circuit level. Secret-key generation on the basis of a single device
is a must for chip anti-counterfeiting, to handle hardware licensing and metering, and to
build a base of trust for secure applications. Physically Unclonable Functions (PUFs) are a
challenging and promising solution to this problem. These and other topics related to the
security and trust of hardware systems will be covered in this course.
Learning Objectives:
Students completing this course will be exposed to a wide range of topics in the new field
of HOST, and will be able to undertake tasks related to HOST, in industry, government or
academic jobs, including:
• Will be knowledgeable of emerging security and trust issues associated with hardware systems
• Will be able to assess vulnerabilities of a hardware device or system
• Will be able to describe attack scenarios that threaten such systems
• Will be able to recommend countermeasures for security and trust vulnerabilities
• Will have experience in the design and implementation of security and trust primitives on both
ASIC and FPGA integrated circuits
• Will be able to evaluate the security and trust of hardware systems using different types of system testing
• Will be able to work in groups to devise security and trust design and evaluation processes
Text:
No Text is available. We will read papers from the Symposium on Hardware-Oriented
Security and Trust (I am a co-founder: http://www.hostsymposium.org/), Transactions on
Information Forensics and Security (TIFS), and will draw material from cryptography
(http://cseweb.ucsd.edu/users/mihir/cse207/classnotes.html) and other sources, e.g., http://
www.trust-hub.org/ where appropriate.
ECE 525: Hardware-Oriented Security and Trust
Supplementary Text:
To be announced
Grading:
The distribution of weights for the exams, homeworks and projects is as follows:
Component
PCT
Midterm
25%
Final
35%
Homework/Labs/Project
35%
Class Participation
5%
No incompletes will be given, except as required by university policy for truly exceptional
circumstances.
Students are encouraged to participate in class.
Cheating at any time in this course will cause you to fail the course.
For a complete description of academic dishonesty, refer to the UNM Student Handbook.
ECE 525: Hardware-Oriented Security and Trust
Tentative Course Outline:
Date
Lecture
Week 1
Week 2
Week 3
Week 4
Week 5
Overview of Hardware Security Areas/Hardware Trojan Problem: News Articles
Hardware Trojan Problem: Taxonomy and Proposed Solutions
Hardware & Software (IP) Trojans: Proposed Solutions
Cryptography Principles and Applications
Cryptographic Hardware Engines & Vulnerabilities, e.g., Differential Power Analysis
Cryptographic Hardware Counter-Measures
OS Hardware Security & Midterm Exam
Fall Break
Physical Unclonable Functions: Principles and Quality Criteria
Physical Unclonable Functions: Implementation Strategies
IC Piracy and Hardware Metering Strategies
IP Piracy and Counter-Measures
FPGA Security Issues
Thanksgiving
Trusted Companion ICs and Board Level Security
Miscellaneous HOST Issues: CAD Tool Security, Scan-Chain Security, etc.
Final exam
Week 6
Week 7
Week 8
Week 9
Week 10
Week 11
Week 12
Week 13
Week 14
Week 15
Week 16
(Note: Changes/Additions to this schedule will be posted on my web site
http://www.ece.unm.edu/~jimp)
Download