In this course, we aim to study security and trust from the hardware perspective. The three main objectives of hardware security that we will cover are secure key generation and storage as well as secure execution. Specifically, we will learn how cryptographic algorithms can become susceptible to physical attacks and how this can be prevented. Topics to be covered in this course include basics of hardware security and its objectives; random number generation; physically unclonable functions; invasive and non-invasive attacks, e.g., side-channel analysis and fault injection; counterfeit detection; semiconductor IP (Intellectual Property) protection.
ECE 576: Applied Cryptography and Physical Attacks
Department