Number of hours
- Lectures 21.0
- Projects -
- Tutorials 6.0
- Internship -
- Laboratory works 6.0
ECTS
ECTS 0.0
Goal(s)
- Educational Objectives: This course is aimed at giving understanding about embedded system security with a focus on the hardware role on the system security. The course offers a broad spectrum of hardware vulnerabilities and associated countermeasures (designed either at the hardware or software level). The course addresses also hardware-based security schemes focusing on their system level integration. The course is based on real life examples.
- Course Outcomes: At the end of the course, the students have understanding on basic terminology and concepts related to hardware vulnerabilities embedded system security and hardware support for system security. They are also exposed to basic cryptography, certification issues and vulnerability analysis methodology. In the end, the students put it all together in the form of a case study for designing and evaluating an embedded system.
Responsible(s)
David HELY, Amir-Pasha MIRBAHA
Content(s)
- Introduction to Embedded System Security
- Side Channel Attack (SCA)
- Attack Principles
- Practical Consideration and different types of SCA
- Designing practical Countermeasures against SCA
- Labs on SCA
- Fault Injection (FI) Attacks
- Objectives and Principles
- FI Means with their effect
- Case studies on HW and SW un FI
- Labs
- Trustworthy Hardware
- Trust Issues during the Integrated Circuit Life Cycle
- Test and Security
- Hardware Trojan
- Counterfeiting and Piracy
- Physical Unclonable Function (PUF)
- Principles
- Design, Integration and Evaluation of PUF
- System Level security based on PUF
- Labs
- Hardware Support for Trusted Computing
- Control Flow Integrity
- Memory Isolation
- Trusted Execution Environment
- System level integration of hardware based security
computer architecture, digital electronics, VHDL/Verilog, signal processing, C programming, embedded system design and test
Test
continuous assessment 25% Labs 25% Final Exam 50%
The exam is given in english only
Calendar
The course exists in the following branches:
- Curriculum - - Semester 9 (this course is given in english only )
- Curriculum - EIS - Semester 9 (this course is given in english only )
- Curriculum - EIS (Apprenticeship) - Semester 9 (this course is given in english only )
Additional Information
Course ID : 5AMSE518
Course language(s):
The course is attached to the following structures:
You can find this course among all other courses.
Bibliography
- Candaele, B., Soudris, D., & Anagnostopoulos, I. (Eds.). (2015). Trusted computing for embedded systems. Cham: Springer International Publishing.
- Verbauwhede, Ingrid MR, ed. Secure integrated circuits and systems. Boston: Springer, 2010.
- Sadeghi, Ahmad-Reza, and David Naccache. Towards hardware-intrinsic security. Springer Berlin Heidelberg, 2010.
- Gebotys, Catherine H. Security in embedded devices. Springer Science & Business Media, 2009.