Hardware Security and Trust


ECE 4451/5451: Introduction to Hardware Security and Trust, 3 Credits

Time: Wed 3:30-5:30pm

Room: TBD



Dr. Mohammad Tehranipoor

Office: ITE 441

Phone: 860-486-3471

Email: tehrani at engr dot uconn dot edu

URL: http://www.engr.uconn.edu/~tehrani

Office hours: Wed 2:30-3:30pm or by appointment


This course will cover the following topics: Cryptographic processor and processing overhead analysis, physical and invasive attacks, side-channel attacks, physically unclonable functions, hardware-based true random number generators, watermarking of Intellectual Property (IP) blocks, FPGA security, passive and active metering for prevention of piracy, access control, hardware Trojan detection and isolation in IP cores and integrated circuits (ICs). The course is self contained. Background on digital design would be sufficient. Introductory lectures will cover basic background on cryptography, authentication, secret sharing, VLSI design, test and verification. The main goals for this course are: 

  Learning the state-of-the-art security methods and devices

  Integration of security as a design metric, not as an afterthought

  Protection of the design intellectual property against piracy and tampering

  Better understanding of attacks and providing countermeasures against them

  Detection and isolation of hardware Trojans

  Counterfeit Electronics: Detection and Prevention


Course Outline:

      Introduction to hardware security and Trust, emerging applications and the new threats

      Introduction to Cryptography

      Basics of VLSI Design and Test

      Counterfeit Detection and Avoidance

      Hardware Metering

      Physically Unclonable Functions and True Random Number Generators

      Fault Injection Attacks

      Watermarking of HW IPs

      Physical Attacks and Tamper resistance

      Side Channel Attacks and Countermeasures, Countermeasures for Embedded Microcontrollers

      Trusted Design in FPGAs

      Security in Embedded Systems

      Security for RFID Tags

      Hardware Trojans

      Secure JTAG

      Crypto Processor Design

      Proof-Carrying Codes


Course Evaluation:

Exams 60%

Quiz 10%

Class Project 25%

Class Participation 5%



M. Tehranipoor and C. Wang, Introduction to Hardware Security and Trust, Springer, 2011



ISCAS'85 and '89 Benchmarks

ITC'99 Benchmarks    

ITC'02 Benchmarks

IWLS 2005 Benchmarks


Useful links for further reading:

Mihir Bellare and Phil Rogaway, Introduction to Modern Cryptography

Ross J. Anderson. Security Engineering: A guide to building dependable distributed systems. John Wiley and Sons, 2001

Matt Bishop , Computer Security: Art and Science, Addison-Wesley,  2003

William Stallings. Cryptography and Network Security, Fourth edition, 2007 (WS)

The Hunt for the Kill Switch

Hardware Trojan (computing)

Defense Science Board Task Force On High Performance Microchip Supply

Old Trick Threatens the Newest Weapons

A Survey of Hardware Trojan taxonomy and Detection

Detecting malicious inclusions in secure hardware: Challenges and Solutions

FPGA Design Security Bibliography

Supergeek pulls off 'near impossible' crypto chip hack

Security through obscurity


Related Conferences and Journals:


International Symposium on Hardware-Oriented Security and Trust (HOST)
Cryptographic Hardware and Embedded Systems (CHES)
IEEE Security & Privacy
The International Conference on Computer-Aided Design (ICCAD)
The Design Automation Conference (DAC)
IEEE Cipher's Calendar of Security and Privacy Related Events


Other Links:

U.S. Department of Education
Cryptography Research, Inc.

Chair for Embedded Security
National Security Agency/Central Security Service
The GAANN (Graduate Assistance in Areas of National Need) Engineering Fellowship Program
Trustable Computing Systems



Trusted Computing Group

Data Encryption Standard, NIST

Xilinx ISE development system