Embedded Systems Security - 5AMSE518
A+Augmenter la taille du texteA-Réduire la taille du texteImprimer le documentEnvoyer cette page par mail
Goals
- Educational Objectives: This course is aimed at giving understanding about embedded system security with a focus on the hardware role on the system security. The course offers a broad spectrum of hardware vulnerabilities and associated countermeasures (designed either at the hardware or software level). The course addresses also hardware-based security schemes focusing on their system level integration. The course is based on real life examples.
- Course Outcomes: At the end of the course, the students have understanding on basic terminology and concepts related to hardware vulnerabilities embedded system security and hardware support for system security. They are also exposed to basic cryptography, certification issues and vulnerability analysis methodology. In the end, the students put it all together in the form of a case study for designing and evaluating an embedded system.
Content - Introduction to Embedded System Security
- Side Channel Attack (SCA)
- Attack Principles
- Practical Consideration and different types of SCA
- Designing practical Countermeasures against SCA
- Labs on SCA
- Fault Injection (FI) Attacks
- Objectives and Principles
- FI Means with their effect
- Case studies on HW and SW un FI
- Labs
- Trustworthy Hardware
- Trust Issues during the Integrated Circuit Life Cycle
- Test and Security
- Hardware Trojan
- Counterfeiting and Piracy
- Physical Unclonable Function (PUF)
- Principles
- Design, Integration and Evaluation of PUF
- System Level security based on PUF
- Labs
- Hardware Support for Trusted Computing
- Control Flow Integrity
- Memory Isolation
- Trusted Execution Environment
- System level integration of hardware based security
Prerequisitescomputer architecture, digital electronics, VHDL/Verilog, signal processing, C programming, embedded system design and test
Tests continuous assessment 25% Labs 25% Final Exam 50%
The exam is given in english only 
Calendar The course exists in the following branches:
- Curriculum - - Semester 9 (this course is given in english only
) - Curriculum - EIS - Semester 9 (this course is given in english only
) - Curriculum - EIS (Apprenticeship) - Semester 9 (this course is given in english only
)
see
the course schedule for 2022-2023
Additional Information Course ID : 5AMSE518
Course language(s): 
The course is attached to the following structures:
You can find this course among all other courses.
Bibliography - Candaele, B., Soudris, D., & Anagnostopoulos, I. (Eds.). (2015). Trusted computing for embedded systems. Cham: Springer International Publishing.
- Verbauwhede, Ingrid MR, ed. Secure integrated circuits and systems. Boston: Springer, 2010.
- Sadeghi, Ahmad-Reza, and David Naccache. Towards hardware-intrinsic security. Springer Berlin Heidelberg, 2010.
- Gebotys, Catherine H. Security in embedded devices. Springer Science & Business Media, 2009.
A+Augmenter la taille du texteA-Réduire la taille du texteImprimer le documentEnvoyer cette page par mail
Date of update April 7, 2021