- Level Foundation
- المدة 12 ساعات hours
- الطبع بواسطة University of Maryland, College Park
-
Offered by
عن
In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.الوحدات
Week 1: Digital System Design: Basics and Vulnerabilities
1
Assignment
- Quiz
7
Videos
- Introduction
- Digital System Specification
- Digital System Implementation
- Function Simplification and Don't Care Conditions
- Sequential System Specification
- Sequential System Implementation
- Vulnerabilities in Digital Logic Design
2
Readings
- Syllabus
- Week 1 Overview
Week 2: Intellectual Property Protection
1
Assignment
- Quiz
6
Videos
- Introduction to IP Protection
- Watermarking Basics
- Watermarking Examples
- Good Watermarks
- Fingerprinting
- Hardware Metering
1
Readings
- Week 2 Overview
Week 3: Physical Attacks and Modular Exponentiation
1
Assignment
- Quiz
7
Videos
- Physical Attacks (PA) Basics
- Physical Attacks and Countermeasures
- Building Secure Systems
- Modular Exponentiation (ME) Basics
- ME in Cryptography
- ME Implementation and Vulnerability
- Montgomery Reduction
1
Readings
- Week 3 Overview
Week 4: Side Channel Attacks and Countermeasures
1
Assignment
- Quiz
5
Videos
- Introduction to Side Channel Attacks
- Memory Vulnerabilities and Cache Attacks
- Power Analysis
- More Attacks and Countermeasures
- Modified Modular Exponentiation
1
Readings
- Week 4 Overview
Week 5: Hardware Trojan Detection and Trusted IC Design
1
Assignment
- Quiz
5
Videos
- Hardware Trojan (HT) and Trusted IC
- Hardware Trojan Taxonomy
- Hardware Trojan Detection Overview
- Hardware Trojan Detection Methods
- Trusted IC Design with HT Prevention
1
Readings
- Week 5 Overview
Week 6: Good Practice and Emerging Technologies
1
Assignment
- Quiz
6
Videos
- FPGA Implementation of Crypto
- Vulnerabilities and Countermeasures in FPGA Systems
- Role of Hardware in Security and Trust
- Physical Unclonable Functions (PUF) Basics
- RO PUF: Reliability
- Trust Platform Module and Other Good Practices
1
Readings
- Week 6 Overview
Final Exam
1
Assignment
- Final Exam
Auto Summary
Explore the "Hardware Security" course on Coursera, focusing on IT & Computer Science. This foundational course, lasting 720 minutes, teaches the importance of security from a hardware perspective. Learn about vulnerabilities in digital systems, physical attacks, and secure hardware design using specialized tools. Available through Starter, Professional, and Paid subscriptions, it's perfect for those seeking to build trusted hardware systems.

Gang Qu