PORTALE DELLA DIDATTICA

PORTALE DELLA DIDATTICA

PORTALE DELLA DIDATTICA

Elenco notifiche



Cybersecurity for Embedded Systems

01UDNOV

A.A. 2024/25

Course Language

Inglese

Degree programme(s)

Master of science-level of the Bologna process in Ingegneria Informatica (Computer Engineering) - Torino

Course structure
Teaching Hours
Lezioni 30
Esercitazioni in aula 10
Esercitazioni in laboratorio 20
Lecturers
Teacher Status SSD h.Les h.Ex h.Lab h.Tut Years teaching
Savino Alessandro   Professore Associato IINF-05/A 30 0 0 0 3
Co-lectures
Espandi

Context
SSD CFU Activities Area context
ING-INF/05 6 B - Caratterizzanti Ingegneria informatica
2024/25
This course provides a comprehensive overview of security in embedded systems from both hardware and software perspectives. Students will gain a deep understanding of the unique challenges and solutions in securing embedded devices, which are increasingly prevalent in today's interconnected world. The course mixes lectures and hands-on experiences and includes a final project in which students, clustered in teams, are asked to face some hot topics in Embedded Systems security and to present detailed reports on them.
By the end of the course, students will be able to: - Understand and articulate the principles of embedded system security from both hardware and software perspectives. - Implement and evaluate hardware-based cryptographic solutions. - Develop secure software applications capable of operating on untrusted hardware. - Utilize hardware-based security mechanisms to establish a secure environment for embedded systems. - Identify and mitigate potential hardware attacks using appropriate countermeasures.
Attendees are assumed to be familiar with the basic concepts of: - C programming languages - Assembly programming languages - Computer Architectures - Basic Cryptography - Digital System Design.
- Introduction to Embedded System Security: Explore the fundamental principles of securing embedded systems, focusing on the interplay between hardware and software security measures. - Fundamentals of Hardware-Implemented Cryptography: Learn about implementing cryptographic algorithms directly in hardware, understanding the benefits and limitations of hardware-based cryptographic solutions. - Secure Software on Untrusted Hardware: Examine techniques and methodologies to develop secure software that can operate on potentially compromised hardware, ensuring data integrity and confidentiality. - Hardware-based Security Mechanisms: Delve into advanced hardware security features such as Root-of-Trust, segregation and trust environments, and Physical Unclonable Functions (PUFs). Understand how these mechanisms provide a foundation for secure system operations. - Hardware Attacks and Countermeasures: Study various hardware attack vectors, including side-channel attacks, hardware trojans, oblivious RAM, and Row Hammer. Learn about the techniques to detect, prevent, and mitigate these threats.
The course includes: o Lectures [30 h] o Practical sessions [30 h, split into hands-on and projects dedicated lectures]
• Copies of the teaching materials used for both the lectures and the Labs;
Lecture notes; Video lectures (current year); Video lectures (previous years); Simulation tools;
Exam: Group essay; Computer-based written test in class using POLITO platform;
The course exam will consist of the following: - Final assessment of the delivered item/product provided by each group* (max 19 points) - Written exam (using exam) with open and closed questions on the topics covered in the course to be completed in 1.5h (max 13 points) The 30L corresponds to 31 to 32 points. The written exam assesses students' understanding and application of the critical concepts covered throughout the course. The exam will be comprehensive, covering both theoretical knowledge and practical applications. It will consist of multiple sections, each targeting specific learning outcomes. Questions assess students' understanding of fundamental concepts and test students' ability to recall and explain particular concepts such as hardware-implemented cryptography, Root-of-Trust, and types of hardware attacks. * Students are asked to cluster into groups of 2 or 3 people, each: - The students freely propose the group composition; - The evaluation includes technical documentation related to the specs and implementation details, including, where applicable, the produced codes and their static analysis results during a project discussion session
In addition to the message sent by the online system, students with disabilities or Specific Learning Disorders (SLD) are invited to directly inform the professor in charge of the course about the special arrangements for the exam that have been agreed with the Special Needs Unit. The professor has to be informed at least one week before the beginning of the examination session in order to provide students with the most suitable arrangements for each specific type of exam.
Esporta Word