Professor: Yier Jin (yier.jin@eecs.ucf.edu)

 

Course Objective:

The purpose of this course is to introduce a newly emerged area, trusted integrated circuits and prepare students for challenges in the field of hardware security. The concept and taxonomy of hardware Trojans will be introduced as well as their malicious impact to both critical and commercial device. Considering the fact that cryptographic embedded systems are often the target of hardware Trojans, cryptographic embedded systems and their vulnerabilities when attacked by hardware Trojans will also be discussed in the course.
Cyber security will also be covered by this course as the preparation for the NYU-Poly CSAW competitions. Therefore, the objective of the course are (1) to give students the idea of hardware security: identify the vulnerabilities of circuit designs, (2) to understand the principles of hardware Trojan detection methods and propose new detection methods to ensure the trustworthiness of the integrated circuits, and (3) to prepare students for the challenge of cyber security. Proposed circuit trust evaluation methods will be simulated based on commercial EDA tools.

 

Projects

The course is a lab-oriented course in the area of hardware security. So you will be working on lab projects from the very beginning of the semester until the very end of the semester, or even further. Please find all lab descriptions below and check back frequently if you forget what the homework is.

Lab 1: Hardware Trojan Design in AES Crypto-System (CSAW 2008 ESC)

Lab 2: Hardware Security Primitive - PUF Designs (CSAW 2011 ESC - Part II)

Lab 3: Vulnerabilities of Computing Platforms (CSAW 2011 ESC - Part I)

Lab 4: Hardware Trojan Detection in FPGA Bit Files (CSAW 2012 ESC)

Take Home Exam: Paper Review (Hardware Metering, Logic Obfuscation, and Split Manufacturing)

Appendix I: Design Tricks

Appendix II: Video Recording (Amazing!)