The course is taught in English and aims to present the most significant aspects of Hardware Security, covering both intellectual property protection and the threads to the functionality of the systems, including their most common weakness, vulnerabilities, attacks, and possible mitigations and remediations.
The course mixes lectures and hands-on experiences.
The course includes a final exam in which students can face theoretical and practical questions related to hardware security.
The course is taught in English and aims to present the most significant aspects of Hardware Security, covering both intellectual property protection and the threats to the functionality of the systems, including their most common weakness, vulnerabilities, attacks, and possible mitigations and remediations.
The course mixes lectures and hands-on experiences.
The course includes a final exam in which students can face theoretical and practical questions related to hardware security.
Having completed the course, the participant will:
- Get familiar with the basic concepts of hardware security, and in particular:
- System Security
- Secure Environments
- Hardware and Hardware-based Security
- For each field, get familiar with its main:
- Vulnerabilities
- Attacks
- Countermeasures
By the end of this course, students will be able to:
- Understand the Importance of Hardware Security: knowledge of the motivation for securing hardware in embedded systems and common threats and vulnerabilities.
- Comprehend VLSI Design Principles: knowledge of the fundamentals of VLSI design, including design methodologies and the role of intellectual property (IP) in VLSI.
- Implement IP Security Measures: Discuss techniques such as watermarking for IP protection and outline the importance of securing printed circuit boards (PCBs).
- Apply Hardware-based Security Mechanisms: knowledge of the key hardware security components like secure elements and TPMs, their role, and the ability to describe practical implementations of hardware security mechanisms.
- Evaluate Hardware Trust: knowledge of hardware trust, ability to detect counterfeit hardware components, and comprehend the role of True Random Number Generators (TRNG) and Physically Unclonable Functions (PUF) in security.
- Analyze and Mitigate Hardware Attacks: the ability to identify various types of hardware attacks, such as side-channel, fault, test-infrastructure-based, invasive attacks, and hardware trojans, and propose countermeasures to defend against these attacks.
Attendees are assumed to be familiar with the basic concepts of:
- C and C++ programming languages
- Assembly programming languages
- Computer Architectures
- Digital System Design
Attendees are assumed to have basic knowledge of:
- C and C++ programming languages
- Assembly programming languages
- Computer Architectures
- Digital System Design
- Introduction to Hardware Security [3h]
- Basics of VLSI Design and IP [4h]
- IP Security [10h]
- Watermarking of HW IPs
- Basics of PCB Security
- Hardware-based security: [3h]
- Introduction & Basic concepts
- Implementations
- Hardware Trust [6h]
- Introduction & Basic Concepts
- Hardware Counterfeiting
- True Random Number Generators (TRNG)
- Physically Unclonable Functions (PUF)
- HW Attacks [10h]
- Side-Channel Attacks
- Fault Attacks
- Test-infrastructure-based Attacks
- Invasive Attacks
- Hardware Trojans
Theory [~3.6 CFU]:
1. Introduction to Hardware Security [~0.3 CFU]
- Overview of Hardware Security: Understanding the importance of securing hardware in embedded systems.
- Threat Landscape: Identifying common threats and vulnerabilities specific to hardware components.
- Security Objectives: Confidentiality, integrity, availability, and authenticity in hardware.
2. Basics of VLSI Design and IP [~0.4 CFU]
- Introduction to VLSI Design: Fundamentals of Very-Large-Scale Integration (VLSI) and its relevance to embedded systems.
- Design Methodologies: Overview of VLSI design flows, tools, and processes.
- Intellectual Property (IP) in VLSI: Understanding the role and importance of IP cores in VLSI design.
3. IP Security [~1 CFU]
- Watermarking of HW IPs: Purpose and watermarking techniques for protecting IP.
- Basics of PCB Security: Overview of PCB Security: Importance of securing Printed Circuit Boards (PCBs).
4. Hardware-based Security [~0.3 CFU]
- Fundamentals of Hardware Security: Core principles and basic concepts.
- Key Hardware Security Components: Overview of secure elements and TPMs (Trusted Platform Modules) components.
- Practical Implementations: Examples of hardware security mechanisms in real-world systems.
5. Hardware Trust [~0.6 CFU]
- Introduction & Basic Concepts: Understanding the concept of trust in hardware and the role and components of Trusted Computing Base (TCB) in securing systems.
- Hardware Counterfeiting: Techniques to detect counterfeit hardware components and Mitigation Strategies to prevent and mitigate the impact of counterfeit hardware.
- True Random Number Generators (TRNG): The Role of TRNGs in cryptographic applications and standard designs and implementation challenges.
- Physically Unclonable Functions (PUF): Basics and significance of PUFs in security and real-world applications, as well as implementation examples of PUFs.
6. Hardware Attacks [~1 CFU]
- Side-Channel Attacks: Types of Side-Channel Attacks (Power analysis, electromagnetic analysis, and timing attacks) and Countermeasures techniques to defend against side-channel attacks.
- Fault Attacks: Understanding how induced faults can compromise security and methods to detect and prevent fault attacks.
- Test-infrastructure-based Attacks: How can testing mechanisms and strategies to secure test access ports and debugging interfaces be exploited?
- Invasive Attacks: Types of Invasive Attacks (Microprobing, reverse engineering, and other physical attacks) and techniques to protect against invasive attacks, such as shielding and obfuscation.
- Hardware Trojans: Understanding the nature and threat of hardware trojans and approaches to detect and mitigate their risk.
Labs [~2.4 CFU]
- Fundamentals of Verilog programming
- Hands-on Experiences on Lecture Topics, i.e., watermarking, True Random Generators, Side-Channel attacks, etc.
The course provides a comprehensive understanding of hardware security, combining theoretical knowledge with practical skills. The course has two main components:
- Lectures [~4CFUs]: The lecture sessions will cover the foundational concepts and advanced topics in hardware security.
- Hands-on Sessions [~2 CFUs]: To reinforce the theoretical concepts learned during lectures, the course includes practical, hands-on sessions where students apply what they've learned in real-world scenarios. These sessions will involve simulation tools, implementation of secure components, and vulnerability analysis of hardware components.
The course includes a final exam in which students can face theoretical and practical questions related to hardware security.
- Copies of the teaching materials used for both the lectures and the Labs.
Copies of the teaching materials used for both the lectures and the Labs. An auxiliary textbook, covering many but not all topics, is:
M. Tehranipoor, N. Anandakumar, and F. Farahmandi, Hardware Security Training, Hands-on!, Springer, 2023.
Slides; Esercitazioni di laboratorio; Video lezioni dell’anno corrente; Strumenti di simulazione;
Lecture slides; Lab exercises; Video lectures (current year); Simulation tools;
Modalità di esame: Prova scritta in aula tramite PC con l'utilizzo della piattaforma di ateneo;
Exam: Computer-based written test in class using POLITO platform;
...
The course exam will consist of questions and short exercises.
Gli studenti e le studentesse con disabilità o con Disturbi Specifici di Apprendimento (DSA), oltre alla segnalazione tramite procedura informatizzata, sono invitati a comunicare anche direttamente al/la docente titolare dell'insegnamento, con un preavviso non inferiore ad una settimana dall'avvio della sessione d'esame, gli strumenti compensativi concordati con l'Unità Special Needs, al fine di permettere al/la docente la declinazione più idonea in riferimento alla specifica tipologia di esame.
Exam: Computer-based written test in class using POLITO platform;
The course exam will consist of closed-book questions and short exercises in 1 hour, scored with 32 maximum points (30L assigned to scores of 31 to 32). Questions will aim at assessing students' ability to:
- Explain Key Concepts: Demonstrate understanding of fundamental concepts covered in the course through concise explanations.
- Analyze Scenarios: Apply theoretical knowledge to analyze specific security scenarios and propose suitable security measures.
- Design Solutions: Design secure hardware and software solutions for problems, reflecting an understanding of practical implementations and countermeasures.
- Evaluate Threats: Critically evaluate hardware threats and propose appropriate mitigation strategies.
The assessment will cover both the theoretical lectures and the hands-on sessions.
In addition to the message sent by the online system, students with disabilities or Specific Learning Disorders (SLD) are invited to directly inform the professor in charge of the course about the special arrangements for the exam that have been agreed with the Special Needs Unit. The professor has to be informed at least one week before the beginning of the examination session in order to provide students with the most suitable arrangements for each specific type of exam.