Embeded SeCurity
Code | Completion | Credits | Range |
---|---|---|---|
PI-ESC | ZK | 4 | 3C |
- Garant předmětu:
- Róbert Lórencz
- Lecturer:
- Tutor:
- Róbert Lórencz
- Supervisor:
- Department of Information Security
- Synopsis:
-
Familiarization of students with the theoretical and practical aspects of embedded security.
Design methods of hardware cryptographic primitives for embedded systems. Understanding of the origin of vulnerabilities when designing digital circuits for embedded systems. Methods of elimination of these vulnerabilities.
- Requirements:
- Syllabus of lectures:
- Syllabus of tutorials:
-
Design tools and their properties in terms of vulnerabilities.
TRNG design and testing.
PUF design and testing.
PUF and TRNG statistical models.
Sources of entropy in FPGA ans ASIC technologies
SPA, DPA, etc.
Hardware trojan horses.
Detection and countermeasures against HW trojan horses.
- Study Objective:
-
Familiarization of students with the theoretical and practical aspects of embedded security.
Design methods of hardware cryptographic primitives for embedded systems. Understanding of the origin of vulnerabilities when designing digital circuits for embedded systems. Methods of elimination of these vulnerabilities.
- Study materials:
- Note:
- Time-table for winter semester 2024/2025:
- Time-table is not available yet
- Time-table for summer semester 2024/2025:
- Time-table is not available yet
- The course is a part of the following study plans:
-
- Informatics (doctoral) (compulsory elective course)
- Informatics (compulsory elective course)