Esisar rubrique Formation 2022

Embedded Systems Security - 5AMSE518

  • Number of hours

    • Lectures 21.0
    • Projects -
    • Tutorials 6.0
    • Internship -
    • Laboratory works 6.0

    ECTS

    ECTS 0.0

Goal(s)

  • Educational Objectives: This course is aimed at giving understanding about embedded system security with a focus on the hardware role on the system security. The course offers a broad spectrum of hardware vulnerabilities and associated countermeasures (designed either at the hardware or software level). The course addresses also hardware-based security schemes focusing on their system level integration. The course is based on real life examples.
  • Course Outcomes: At the end of the course, the students have understanding on basic terminology and concepts related to hardware vulnerabilities embedded system security and hardware support for system security. They are also exposed to basic cryptography, certification issues and vulnerability analysis methodology. In the end, the students put it all together in the form of a case study for designing and evaluating an embedded system.

Responsible(s)

David HELY, Amir-Pasha MIRBAHA

Content(s)

  • Introduction to Embedded System Security
  • Side Channel Attack (SCA)
    • Attack Principles
    • Practical Consideration and different types of SCA
    • Designing practical Countermeasures against SCA
    • Labs on SCA
  • Fault Injection (FI) Attacks
    • Objectives and Principles
    • FI Means with their effect
    • Case studies on HW and SW un FI
    • Labs
  • Trustworthy Hardware
    • Trust Issues during the Integrated Circuit Life Cycle
    • Test and Security
    • Hardware Trojan
    • Counterfeiting and Piracy
  • Physical Unclonable Function (PUF)
    • Principles
    • Design, Integration and Evaluation of PUF
    • System Level security based on PUF
    • Labs
  • Hardware Support for Trusted Computing
    • Control Flow Integrity
    • Memory Isolation
    • Trusted Execution Environment
    • System level integration of hardware based security

Prerequisites

computer architecture, digital electronics, VHDL/Verilog, signal processing, C programming, embedded system design and test

Test

continuous assessment 25% Labs 25% Final Exam 50%

The exam is given in english only FR

Calendar

The course exists in the following branches:

  • Curriculum - - Semester 9 (this course is given in english only EN)
  • Curriculum - EIS - Semester 9 (this course is given in english only EN)
  • Curriculum - EIS (Apprenticeship) - Semester 9 (this course is given in english only EN)
see the course schedule for 2022-2023

Additional Information

Course ID : 5AMSE518
Course language(s): FR

The course is attached to the following structures:

You can find this course among all other courses.

Bibliography

  • Candaele, B., Soudris, D., & Anagnostopoulos, I. (Eds.). (2015). Trusted computing for embedded systems. Cham: Springer International Publishing.
  • Verbauwhede, Ingrid MR, ed. Secure integrated circuits and systems. Boston: Springer, 2010.
  • Sadeghi, Ahmad-Reza, and David Naccache. Towards hardware-intrinsic security. Springer Berlin Heidelberg, 2010.
  • Gebotys, Catherine H. Security in embedded devices. Springer Science & Business Media, 2009.