After successful completion of the course, students are able to...
- Understand integrated circuit design and manufacturing flow and the supply chain
- Understand and apply integrated circuit testing and design-for-testability techniques
- Discuss security and trust vulnerabilities of integrated circuits
- Define red-team blue-team approach in hardware security - Understand, assess, and compare state-of-the-art design and detection solutions in mitigating the security and trust vulnerabilities
Furthermore, students will have obtained knowledge and comprehension of topics described below.
Contact details: os22@nyu.edu
This course covers topics related to security and trustworthiness of electronic hardware. The focus of the course is on the Integrated Circuit (IC) supply chain vulnerabilities and potential remedies in the form of design-for-trust, i.e., proactive techniques employed at the design stage to protect the IC from a variety of supply chain threats. Lectures and in-class discussions on recent research papers cover the following topics:
Design and manufacturing flow of integrated circuits, testing, and design-for-testability infrastructure (2 hours)
Integrated circuit supply chain vulnerabilities; hardware Trojans, reverse engineering and Intellectual Property (IP) piracy, counterfeiting, overproduction (2 hours)
Detection techniques for hardware Trojans and counterfeit chips (2 hours) Design-for-Trust techniques: logic locking, split manufacturing, and IC camouflaging (2 hours)
Threat models, attacks, and defenses in logic locking (4 hours) Machine learning in the context of hardware security (2 hours) Scan attacks and mitigation techniques (2 hours)
Fault injection and mitigation techniques (2 hours)
Hardware security in the context of emerging technologies: random number generators, physically unclonable functions (PUFs) (2 hours)
Lectures will be given by the instructor through powerpoint slides which will be provided to the students before each class. A part of some of the lectures may be dedicated to electronic design automation (EDA) tool usage demos for the students. A part of some of the (last 3-4) lectures may include student-group presentations on select topics; technical papers will be provided to the students to study in preparation of these presentations.
The course is open to all PhD students and interested Master students.
May 30-June 3: Everyday, two hours (anytime in the day)June 20-24: Everyday, two hours (anytime in the day)
Literature
- Trustworthy Hardware Design: Combinational Logic Locking Techniques, Muhammad Yasin, Prof. Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu, Springer, 2020, Electronic ISBN: 978-3-030-15334-2
- The Next Era in Hardware Security, Nikhil Rangarajan, Satwik Patnaik, Johann Knechtel, Shaloo Rakheja, Ozgur Sinanoglu, Springer, 2021, ISBN: 978-3-030-85791-2
- 20-30 technical papers that will be made available to the students at the beginning of the course
There will be a final exam, which together with students’ performance in their in-class presentations, will be used to assign a final grade.
Please register in TISS.
Good understanding of digital logic design and algorithms.