01GYSUV, 01GYSUW
A.A. 2024/25
Inglese
Master of science-level of the Bologna process in Cybersecurity - Torino
Teaching | Hours |
---|---|
Lezioni | 36 |
Esercitazioni in laboratorio | 24 |
Teacher | Status | SSD | h.Les | h.Ex | h.Lab | h.Tut | Years teaching |
---|---|---|---|---|---|---|---|
Savino Alessandro | Professore Associato | IINF-05/A | 22 | 0 | 0 | 0 | 2 |
Teacher | Status | SSD | h.Les | h.Ex | h.Lab | h.Tut |
---|---|---|---|---|---|---|
Martina Maurizio | Professore Ordinario | IINF-01/A | 14 | 0 | 6 | 0 |
Melendez Carmona Tzamn | Dottorando | 0 | 0 | 18 | 0 | |
Nardin Andrea | Ricercatore L240/10 | IINF-03/A | 10 | 0 | 5 | 0 |
SSD | CFU | Activities | Area context | ING-INF/01 ING-INF/03 ING-INF/05 |
2 6 4 |
F - Altre attività (art. 10) C - Affini o integrative C - Affini o integrative |
Altre conoscenze utili per l'inserimento nel mondo del lavoro Attività formative affini o integrative Attività formative affini o integrative |
---|
Inglese
Master of science-level of the Bologna process in Cybersecurity - Torino
Teaching | Hours |
---|---|
Lezioni | 36 |
Esercitazioni in laboratorio | 24 |
Teacher | Status | SSD | h.Les | h.Ex | h.Lab | h.Tut | Years teaching |
---|---|---|---|---|---|---|---|
Mellia Marco | Professore Ordinario | IINF-05/A | 45 | 0 | 0 | 0 | 2 |
Teacher | Status | SSD | h.Les | h.Ex | h.Lab | h.Tut |
---|---|---|---|---|---|---|
Martina Maurizio | Professore Ordinario | IINF-01/A | 14 | 0 | 6 | 0 |
Melendez Carmona Tzamn | Dottorando | 0 | 0 | 18 | 0 | |
Nardin Andrea | Ricercatore L240/10 | IINF-03/A | 10 | 0 | 5 | 0 |
SSD | CFU | Activities | Area context | ING-INF/01 ING-INF/03 ING-INF/05 |
2 6 4 |
F - Altre attività (art. 10) C - Affini o integrative C - Affini o integrative |
Altre conoscenze utili per l'inserimento nel mondo del lavoro Attività formative affini o integrative Attività formative affini o integrative |
---|
Hardware & Wireless Security (Hardware and embedded security)
The course is taught in English and aims to present the most significant aspects of Hardware Security, covering both intellectual property protection and the threads to the functionality of the systems, including their most common weakness, vulnerabilities, attacks, and possible mitigations and remediations. The course mixes lectures and hands-on experiences. The course includes a final exam in which students can face theoretical and practical questions related to hardware security.
Hardware & Wireless Security (Wireless and device-to-device communication Security)
The course, taught in English in the second semester of the second year of the Master of Science in Cybersecurity, is one of the characterizing courses of all the tracks. It aims at presenting the technologies for wireless communications and the security challenges they create for the cyber security of IT systems. This course focuses on the challenges in providing secure communication and network services in various wireless systems and approaches to managing these challenges. Topic coverage includes both the technology overview of different wireless communications systems and vulnerabilities, attacks, security mechanisms, and trade-offs at various layers of the protocol stack, from aspects of physical communication to application and service security issues; examples include jamming, MAC-layer misbehaviour, selective packet dropping, and cross-layer holistic attacks. The course introduces wireless technologies, including cellular, WiFi, Bluetooth, NFC, IoT-specific technologies and navigation systems. The students will learn about the various wireless system architectures and the security challenges one must consider and face to offer a reliable and secure communication system. The students will gain hands-on experience using tools and practical lab experiences.
Hardware & Wireless Security (Hardware and embedded security)
The course is taught in English and aims to present the most significant aspects of Hardware Security, covering both intellectual property protection and the threads to the functionality of the systems, including their most common weakness, vulnerabilities, attacks, and possible mitigations and remediations. The course mixes lectures and hands-on experiences. The course includes a final exam in which students can face theoretical and practical questions related to hardware security.
Hardware & Wireless Security (Wireless and device-to-device communication Security)
The course, taught in English in the second semester of the second year of the Master of Science in Cybersecurity, is one of the characterising courses of all the tracks. It aims to present the technologies for wireless communications and the challenges they create for the cyber security of IT systems. The course focuses on the challenges of providing secure communication and network services in various wireless systems and the approaches to address these challenges. Covered topics include both the technology overview of different wireless communications systems, vulnerabilities, attacks, security mechanisms, and trade-offs at various layers of the protocol stack, from aspects of physical communication to application and service security issues; examples include jamming, MAC-layer misbehaviour, denial of service attacks, and cross-layer holistic attacks. The course introduces wireless technologies, including global navigation satellite systems (e.g. GPS), WiFi, Bluetooth, 3G/4G cellular networks and NFC technologies. The student will learn about the various wireless system architectures and the security challenges one must consider and face to offer a reliable and secure communication system. The students will gain hands-on experience using tools and practical lab experiences.
Hardware & Wireless Security (Hardware and embedded security)
Having completed the course, the participant will: - Get familiar with the basic concepts of hardware security, and in particular: - System Security - Secure Environments - Hardware and Hardware-based Security - For each field, get familiar with its main: - Vulnerabilities - Attacks - Countermeasures
Hardware & Wireless Security (Wireless and device-to-device communication Security)
- Knowledge of the wireless communication - Knowledge of specific wireless technologies, including cellular, WiFi, Bluetooth, NFC, IoT-specific solutions and navigation systems. - Knowledge of security challenges in wireless transmission systems - Knowledge of the leading solution and countermeasures to detect and limit possible attacks - Gain hands-on experience in vulnerability analysis and secure system, service, or protocol design.
Hardware & Wireless Security (Hardware and embedded security)
By the end of this course, students will be able to: - Understand the Importance of Hardware Security: knowledge of the motivation for securing hardware in embedded systems and common threats and vulnerabilities. - Comprehend VLSI Design Principles: knowledge of the fundamentals of VLSI design, including design methodologies and the role of intellectual property (IP) in VLSI. - Implement IP Security Measures: Discuss techniques such as watermarking for IP protection and outline the importance of securing printed circuit boards (PCBs). - Apply Hardware-based Security Mechanisms: knowledge of the key hardware security components like secure elements and TPMs, their role, and the ability to describe practical implementations of hardware security mechanisms. - Evaluate Hardware Trust: knowledge of hardware trust, ability to detect counterfeit hardware components, and comprehend the role of True Random Number Generators (TRNG) and Physically Unclonable Functions (PUF) in security. - Analyze and Mitigate Hardware Attacks: the ability to identify various types of hardware attacks, such as side-channel, fault, test-infrastructure-based, invasive attacks, and hardware trojans, and propose countermeasures to defend against these attacks.
Hardware & Wireless Security (Wireless and device-to-device communication Security)
- Knowledge of wireless communication. - Knowledge of specific wireless technologies, including global navigation satellite systems, WiFi, Bluetooth, 3G/4G networks, and NFC solutions. - Knowledge of security challenges in wireless transmission systems. - Knowledge of the main solution and countermeasures to detect and limit possible attacks. - Gain hands-on experience in vulnerability analysis and secure system, service, or protocol design.
Hardware & Wireless Security (Hardware and embedded security)
Attendees are assumed to be familiar with the basic concepts of: - C and C++ programming languages - Assembly programming languages - Computer Architectures - Digital System Design
Hardware & Wireless Security (Wireless and device-to-device communication Security)
- Knowledge of computer network architectures, WiFi, and TCP/IP protocol stack. - Basic knowledge of programming languages and application security. - Knowledge of the main categories of attack against IT systems. - Knowledge of the main concepts (public-key and symmetric encryption) and technologies (PKI, firewall, VPN, TLS) for IT security. - Knowledge of the security architectures for authentication and access control. - Ability to analyze the risks of a distributed application.
Hardware & Wireless Security (Hardware and embedded security)
Attendees are assumed to have basic knowledge of: - C and C++ programming languages - Assembly programming languages - Computer Architectures - Digital System Design
Hardware & Wireless Security (Wireless and device-to-device communication Security)
- Knowledge of computer network architectures, WiFi, and TCP/IP protocol stack. - Basic knowledge of programming languages and application security. - Knowledge of the main categories of attack against IT systems. - Knowledge of the main concepts (public-key and symmetric encryption) and IT security technologies (PKI, firewall, VPN, TLS). - Knowledge of the security architectures for authentication and access control. - Ability to analyse the risks of a distributed application. - Elementary knowledge of digital communications and signals
Hardware & Wireless Security (Hardware and embedded security)
- Introduction to Hardware Security [3h] - Basics of VLSI Design and IP [4h] - IP Security [10h] - Watermarking of HW IPs - Basics of PCB Security - Hardware-based security: [3h] - Introduction & Basic concepts - Implementations - Hardware Trust [6h] - Introduction & Basic Concepts - Hardware Counterfeiting - True Random Number Generators (TRNG) - Physically Unclonable Functions (PUF) - HW Attacks [10h] - Side-Channel Attacks - Fault Attacks - Test-infrastructure-based Attacks - Invasive Attacks - Hardware Trojans
Hardware & Wireless Security (Wireless and device-to-device communication Security)
1) Security at the physical layer (1.5 CFU) - Review of basic concepts for digital communications: Wireless Communication Overview, Wireless Channel, Signal Propagation, Digital Modulations - Physical layer security issues: jamming, anti-jamming/Jamming-resistance - Global Navigation Satellite Systems (GNSS) and positioning: Operating principles, signals and main systems (GPS and Galileo); Intentional and unintentional interference with GNSS signals, jamming, spoofing and countermeasures 2) Security of Cellular Networks (1 CFU) - 3G/4G/5G Network Structure and Architectures - Authentication and Confidentiality in cellular networks - Overview of Attacks and Countermeasures. 3) Security in WiFi Networks (1.5 CFU) - IEEE 802.11 Architecture and Protocols, Control and Management Frames - Security in WiFi: Rogue Access Points, WEP, WPA, IEEE 802.11i, IEEE 802.11w, Selfish behaviour at the WLAN MAC Layer. - Lab on WiFi security 4) Bluetooth security (1 CFU) - Overview of Bluetooth wireless technology, Bluetooth pairing, authentication, confidentiality, Low energy features - Bluetooth Vulnerabilities, Threats, and Countermeasures: bluesnarfing, bluejacking, DoS, MiTM - Lab on Bluetooth security 5) Security of Near Field Communications (NFCs) and RFIDs (1 CFU) - Introduction to NFC and RFID Technologies, Tags and Readers - NFC and RFID Security and Privacy Issues, Real-World Attacks, Standardisation Activities, Authentication and Access Control Protocols.
Hardware & Wireless Security (Hardware and embedded security)
1. Introduction to Hardware Security [3h] - Overview of Hardware Security: Understanding the importance of securing hardware in embedded systems. - Threat Landscape: Identifying common threats and vulnerabilities specific to hardware components. - Security Objectives: Confidentiality, integrity, availability, and authenticity in hardware. 2. Basics of VLSI Design and IP [4h] - Introduction to VLSI Design: Fundamentals of Very-Large-Scale Integration (VLSI) and its relevance to embedded systems. - Design Methodologies: Overview of VLSI design flows, tools, and processes. - Intellectual Property (IP) in VLSI: Understanding the role and importance of IP cores in VLSI design. 3. IP Security [10h] - Watermarking of HW IPs [4h]: Purpose and watermarking techniques for protecting IP. - Basics of PCB Security [6h]: Overview of PCB Security: Importance of securing Printed Circuit Boards (PCBs). 4. Hardware-based Security [3h] - Fundamentals of Hardware Security: Core principles and basic concepts. - Key Hardware Security Components: Overview of secure elements and TPMs (Trusted Platform Modules) components. - Practical Implementations: Examples of hardware security mechanisms in real-world systems. 5. Hardware Trust [6h] - Introduction & Basic Concepts [1h]: Understanding the concept of trust in hardware and the role and components of Trusted Computing Base (TCB) in securing systems. - Hardware Counterfeiting [2h]: Techniques to detect counterfeit hardware components and Mitigation Strategies to prevent and mitigate the impact of counterfeit hardware. - True Random Number Generators (TRNG) [1.5h]: The Role of TRNGs in cryptographic applications and standard designs and implementation challenges. - Physically Unclonable Functions (PUF) [1.5h]: Basics and significance of PUFs in security and real-world applications and implementation examples of PUFs. 6. Hardware Attacks [10h] - Side-Channel Attacks [2.5h]: Types of Side-Channel Attacks (Power analysis, electromagnetic analysis, and timing attacks) and Countermeasures techniques to defend against side-channel attacks. - Fault Attacks [2h]: Understanding how induced faults can compromise security and methods to detect and prevent fault attacks. - Test-infrastructure-based Attacks [2h]: How testing mechanisms can be exploited and strategies to secure test access ports and debugging interfaces. - Invasive Attacks [2.5h]: Types of Invasive Attacks (Microprobing, reverse engineering, and other physical attacks) and techniques to protect against invasive attacks, such as shielding and obfuscation. - Hardware Trojans [1h]: Understanding the nature and threat of hardware trojans and approaches to detect and mitigate their risk.
Hardware & Wireless Security (Wireless and device-to-device communication Security)
1) Security at the physical layer (1.5 CFU) - Review of basic concepts for digital communications: Wireless Communication Overview, Signal representation, Signal Propagation, Digital Modulations - Physical layer security issues: jamming, anti-jamming/Jamming-resistance - Global Navigation Satellite Systems (GNSS) and positioning: Operating principles, signals and main systems (GPS and Galileo); - GNSS threats: Intentional and unintentional interference with GNSS signals, jamming, spoofing and countermeasures 2) Security in WiFi Networks (2 CFU) - IEEE 802.11 Architecture and Protocols, Control and Management Frames - Security in WiFi: Rogue Access Points, WEP, WPA, IEEE 802.11i, IEEE 802.11w, Selfish behaviour at the WLAN MAC Layer. - Lab on WiFi security 3) Bluetooth security (1 CFU) - Overview of Bluetooth wireless technology, Bluetooth pairing, authentication, confidentiality, Low energy features - Bluetooth Vulnerabilities, Threats, and Countermeasures: bluesnarfing, bluejacking, DoS, MiTM - Lab on Bluetooth security 4) Security of Cellular Networks (1 CFU) - 3G/4G/5G Network Structure and Architecture - Authentication and Confidentiality in cellular networks - Overview of Attacks and Countermeasures. 5) Security of Near Field Communications (NFCs) and RFIDs (0.5 CFU) - Introduction to NFC and RFID Technologies, Tags and Readers - NFC and RFID Security and Privacy Issues, Real-World Attacks, Standardisation Activities, Authentication and Access Control Protocols.
Hardware & Wireless Security (Hardware and embedded security)
Hardware & Wireless Security (Wireless and device-to-device communication Security)
Hardware & Wireless Security (Hardware and embedded security)
Hardware & Wireless Security (Wireless and device-to-device communication Security)
Hardware & Wireless Security (Hardware and embedded security)
The course includes: - Lectures [36 h] - Hands-on sessions [24 h]
Hardware & Wireless Security (Wireless and device-to-device communication Security)
The course is structured into lectures in the classroom (5 credits) and laboratories (1 credit), consisting of software tools and sniffers to put into practice some of the theoretical attacks seen during the classes. During the labs, the students will discuss their solutions to the assigned exercises with the teachers.
Hardware & Wireless Security (Hardware and embedded security)
The course is designed to provide a comprehensive understanding of hardware security, combining theoretical knowledge with practical skills. The course is divided into two main components: - Lectures [40 hours]: The lecture sessions will cover the foundational concepts and advanced topics in hardware security. - Hands-on Sessions [20 hours]: To reinforce the theoretical concepts learned during lectures, the course includes practical, hands-on sessions where students will apply what they've learned in real-world scenarios. These sessions will involve: Simulation Tools, Secure Components implementations, and vulnerability analysis of Hardware components. The course includes a final exam in which students can face theoretical and practical questions related to hardware security.
Hardware & Wireless Security (Wireless and device-to-device communication Security)
The course is structured into lectures in the classroom (4.5 credits) and laboratories (1.5 credits), consisting of using software tools and sniffers to practice some of the theoretical attacks seen during the classes. During the labs, the students will discuss their solutions to the assigned exercises with the teachers. Students will work in groups and prepare reports on lab experiences. Students will grade other students’ reports using a peer grading platform. During the labs, students will participate in challenges to complete attacks seen during the course.
Hardware & Wireless Security (Hardware and embedded security)
- Copies of the teaching materials used for both the lectures and the Labs.
Hardware & Wireless Security (Wireless and device-to-device communication Security)
The teachers will provide the material (slides and links to online resources) on the course website.
Hardware & Wireless Security (Hardware and embedded security)
Copies of the teaching materials used for both the lectures and the Labs. An auxiliary textbook, covering many but not all topics, is: M. Tehranipoor, N. Anandakumar, and F. Farahmandi, Hardware Security Training, Hands-on!, Springer, 2023.
Hardware & Wireless Security (Wireless and device-to-device communication Security)
The teachers will provide the material (slides and links to online resources) on the course website. As auxiliary textbooks, covering many but not all topics, we suggest: 1) Wireless technology and security: Security in Wireless Communication Networks, Yi Qian, Feng Ye, Hsiao-Hwa Chen, First published:25 November 2021, Print ISBN:9781119244363 |Online ISBN:9781119244400, DOI:10.1002/9781119244400 2) Signal Processing: L. Lo Presti e F. Neri, L'analisi dei segnali, CLUT, 1992. 3) Digital communications: Proakis, J. G., & Salehi, M. (2008). Digital communications. McGraw-hill. 4) GNSS: Kaplan, E. D., & Hegarty, C. (Eds.). (2017). Understanding GPS/GNSS: principles and applications. Artech house. 5) GNSS Threats: Dovis, F. (Ed.). (2015). GNSS interference threats and countermeasures. Artech House.
Hardware & Wireless Security (Hardware and embedded security)
Slides; Esercitazioni di laboratorio; Video lezioni dell’anno corrente; Strumenti di simulazione;
Hardware & Wireless Security (Wireless and device-to-device communication Security)
Slides; Libro di testo; Esercitazioni di laboratorio; Strumenti di collaborazione tra studenti;
Hardware & Wireless Security (Hardware and embedded security)
Lecture slides; Lab exercises; Video lectures (current year); Simulation tools;
Hardware & Wireless Security (Wireless and device-to-device communication Security)
Lecture slides; Text book; Lab exercises; Student collaboration tools;
Hardware & Wireless Security (Hardware and embedded security)
Modalità di esame: Prova scritta in aula tramite PC con l'utilizzo della piattaforma di ateneo;
Hardware & Wireless Security (Wireless and device-to-device communication Security)
Modalità di esame: Prova orale facoltativa; Elaborato scritto prodotto in gruppo; Prova scritta in aula tramite PC con l'utilizzo della piattaforma di ateneo;
Hardware & Wireless Security (Hardware and embedded security)
Exam: Computer-based written test in class using POLITO platform;
Hardware & Wireless Security (Wireless and device-to-device communication Security)
Exam: Optional oral exam; Group essay; Computer-based written test in class using POLITO platform;
Hardware & Wireless Security (Hardware and embedded security)
The course exam will consist of questions and short exercises.
Hardware & Wireless Security (Wireless and device-to-device communication Security)
The exam consists of a written test that may include open-answer and closed-answer questions or exercises to check that the student has acquired the expected knowledge and skills (see expected learning outcomes). For the part about skills, the questions may be simple exercises or use cases related to the tools experimented with in the laboratories. For each question, the maximum grade that can be obtained is specified. The final grade will be the sum of the grades assigned to the answers given to the questions. The written test will be taken using the Exams platform in a classroom. In case of technical problems, the students may be asked to write their test with pencil and paper. The total duration of the test, as measured by the Exams platform, which includes the setup time, is 1 hour and 40 minutes. The test is closed-book, i.e., the student cannot consult any material during the test and cannot use any electronic device except the PC used for the test. Students with a grade of 25/30 or higher can opt for the oral exam. During the oral, the students will discuss all topics presented during the course. The grade of the oral exam may add a score between -3 and +3 to the grade of the written exam. Additionally, the teachers will request an oral exam in case of doubts about the evaluation of the written test. The oral exam will consist of additional questions to resolve the teachers' doubts in the evaluation. A sample exam test will be made available to the students through the Exercise platform.
Hardware & Wireless Security (Hardware and embedded security)
Exam: Computer-based written test in class using POLITO platform;
Hardware & Wireless Security (Wireless and device-to-device communication Security)
Exam: Optional oral exam; Group essay; Computer-based written test in class using POLITO platform;
Hardware & Wireless Security (Hardware and embedded security)
The course exam will consist of closed book questions and short exercises in a 1.5-hour time window, scored with 32 maximum points (30L assigned to 31 to 32 scores). Questions will aim at assessing students' ability to: - Explain Key Concepts: Demonstrate understanding of fundamental concepts covered in the course through concise explanations. - Analyze Scenarios: Apply theoretical knowledge to analyze specific security scenarios and propose suitable security measures. - Design Solutions: Design secure hardware and software solutions for problems, reflecting an understanding of practical implementations and countermeasures. - Evaluate Threats: Critically evaluate hardware threats and propose appropriate mitigation strategies.
Hardware & Wireless Security (Wireless and device-to-device communication Security)
Exam: Optional reports (1 point each): Students will work in groups and prepare two reports. Students will grade reports of other groups via the peer-grading platform. For each report, the top 80% of reports will obtain 1 extra point, while the bottom 20% will get 0.5 points. Students participating in the peer grading will get 1 point if their review is thorough and properly done, 0.5 if superficial, and 0 if not done or inconsistent. Challenges (1 point each): during the labs, students will have to demonstrate their abilities to mount attacks seen during the course. Students completing the challenge within a deadline will get one extra point. Interaction during classes (1 point max): students answering questions during classes will get one extra point. Computer-based written test in class using the POLITO platform (28 points max): The exam consists of a written test that includes open-answer and closed-answer questions or exercises to check that the student has acquired the expected knowledge and skills (see expected learning outcomes). For the part about skills, the questions may be simple exercises or use cases related to the tools experimented in the laboratories. For each question, the maximum grade that can be obtained is specified. The final grade will be the sum of the grades assigned to the answers given to the questions. The written test will be taken in a classroom using the Exams platform. In case of technical problems, the students may be asked to write their test with pencil and paper. The total duration of the test, as measured by the Exams platform, which includes the setup time, is 1 hour and 40 minutes. The test is closed-book, i.e., the student cannot consult any material during the test and cannot use any electronic device except the PC used for the test. A set of sample questions is available to the students through the online course platform. Optional oral test: The teacher may request an oral test to be carried out in case of doubts about the evaluation of the written test. The oral test will consist of additional questions to resolve the teachers' doubts that emerged in evaluating the student's written test. Final grading: the final grade will be the sum of the written exam (max 28 points), the group reports (max 2 points), the peer grading participation (max 2 points), the challenges (max 1 point) and the class interaction (max 1 point).