Aller au menu Aller au contenu
Academics
Academics
Academics

> Study at Esisar > Master in English

Embedded Systems Security - 5AMSE518

A+Augmenter la taille du texteA-Réduire la taille du texteImprimer le documentEnvoyer cette page par mail cet article Facebook Twitter Linked In
  • Number of hours

    • Lectures : 21.0
    • Tutorials : 6.0
    • Laboratory works : 6.0
    • Projects : -
    • Internship : -
    ECTS : 0.0
  • Officials : David HELY

Goals

  • Educational Objectives: This course is aimed at giving understanding about embedded system security with a focus on the hardware role on the system security. The course offers a broad spectrum of hardware vulnerabilities and associated countermeasures (designed either at the hardware or software level). The course addresses also hardware-based security schemes focusing on their system level integration. The course is based on real life examples.
  • Course Outcomes: At the end of the course, the students have understanding on basic terminology and concepts related to hardware vulnerabilities embedded system security and hardware support for system security. They are also exposed to basic cryptography, certification issues and vulnerability analysis methodology. In the end, the students put it all together in the form of a case study for designing and evaluating an embedded system.

Content

  • Introduction to Embedded System Security
  • Side Channel Attack (SCA)
    • Attack Principles
    • Practical Consideration and different types of SCA
    • Designing practical Countermeasures against SCA
    • Labs on SCA
  • Fault Injection (FI) Attacks
    • Objectives and Principles
    • FI Means with their effect
    • Case studies on HW and SW un FI
    • Labs
  • Trustworthy Hardware
    • Trust Issues during the Integrated Circuit Life Cycle
    • Test and Security
    • Hardware Trojan
    • Counterfeiting and Piracy
  • Physical Unclonable Function (PUF)
    • Principles
    • Design, Integration and Evaluation of PUF
    • System Level security based on PUF
    • Labs
  • Hardware Support for Trusted Computing
    • Control Flow Integrity
    • Memory Isolation
    • Trusted Execution Environment
    • System level integration of hardware based security

Prerequisites

computer architecture, digital electronics, VHDL/Verilog, signal processing, C programming, embedded system design and test

Tests

continuous assessment 25% Labs 25% Final Exam 50%

The exam is given in english only FR

Calendar

The course exists in the following branches:

  • Curriculum - EIS - Semester 9 (this course is given in english only EN)
  • Curriculum - EIS (Apprenticeship) - Semester 9 (this course is given in english only EN)
  • Curriculum - - Semester 9 (this course is given in english only EN)
see the course schedule for 2021-2022

Additional Information

Course ID : 5AMSE518
Course language(s): FR

The course is attached to the following structures:

  • Team Hardware and software systems

You can find this course among all other courses.

Bibliography

  • Candaele, B., Soudris, D., & Anagnostopoulos, I. (Eds.). (2015). Trusted computing for embedded systems. Cham: Springer International Publishing.
  • Verbauwhede, Ingrid MR, ed. Secure integrated circuits and systems. Boston: Springer, 2010.
  • Sadeghi, Ahmad-Reza, and David Naccache. Towards hardware-intrinsic security. Springer Berlin Heidelberg, 2010.
  • Gebotys, Catherine H. Security in embedded devices. Springer Science & Business Media, 2009.

A+Augmenter la taille du texteA-Réduire la taille du texteImprimer le documentEnvoyer cette page par mail cet article Facebook Twitter Linked In

Date of update April 7, 2021

Université Grenoble Alpes