ECE
459/559 - Secure &
Trustworthy Computer Hardware Design
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description: This
course provides an in-depth introduction to a range of developments
for the design of secure and trustworthy computer hardware. Topics
covered include physical and invasive attack models, SCA attacks,
physical unclonable functions, hardware-based random number
generators, watermarking of intellectual property (IP) blocks, FPGA
security, passive and active metering for piracy prevention, and
hardware Trojan detection and isolation. NOTE: Pre-requisite (ECE351)
requirement can be waived on a case by case basis. Please discuss with
instructor for more details.
Instrustor: Dr. Garrett S. Rose
Office: Min Kao 308 Email: garose@utk.edu Web: web.eecs.utk.edu/~grose4/ Phone: 865-974-3132 Course Syllabus Suggested Text (not required): M. Tehranipoor and C. Wang, Introduction
to Hardware
Security and Trust,
Springer, 2012.
Lectures: MWF 10:10am - 11:00am, MK525 Schedule & Topics Covered:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|