Hardware Security

  • 4.3
Approx. 12 hours to complete

Course Summary

This course teaches how hardware can be attacked and how to design secure systems. It covers a range of topics including side-channel attacks, fault injection, and hardware trojans.

Key Learning Points

  • Learn how to identify and defend against hardware attacks
  • Gain hands-on experience with hardware security tools
  • Understand how to design secure hardware systems

Job Positions & Salaries of people who have taken this course might have

    • USA: $95,000
    • India: ₹7,00,000
    • Spain: €42,000
    • USA: $95,000
    • India: ₹7,00,000
    • Spain: €42,000

    • USA: $120,000
    • India: ₹10,00,000
    • Spain: €60,000
    • USA: $95,000
    • India: ₹7,00,000
    • Spain: €42,000

    • USA: $120,000
    • India: ₹10,00,000
    • Spain: €60,000

    • USA: $85,000
    • India: ₹6,00,000
    • Spain: €36,000

Related Topics for further study


Learning Outcomes

  • Identify and defend against hardware attacks
  • Design secure hardware systems
  • Gain hands-on experience with hardware security tools

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of computer architecture and programming
  • Access to a computer with internet connection

Course Difficulty Level

Intermediate

Course Format

  • Online
  • Self-paced
  • Video lectures
  • Hands-on projects

Similar Courses

  • Cybersecurity: Hardware Hacking
  • Hardware Security
  • Hardware Security II

Related Education Paths


Related Books

Description

In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.

Outline

  • Digital System Design: Basics and Vulnerabilities
  • Introduction
  • Digital System Specification
  • Digital System Implementation
  • Function Simplification and Don't Care Conditions
  • Sequential System Specification
  • Sequential System Implementation
  • Vulnerabilities in Digital Logic Design
  • Syllabus
  • Week 1 Overview
  • Quiz
  • Design Intellectual Property Protection
  • Introduction to IP Protection
  • Watermarking Basics
  • Watermarking Examples
  • Good Watermarks
  • Fingerprinting
  • Hardware Metering
  • Week 2 Overview
  • Quiz
  • Physical Attacks and Modular Exponentiation
  • Physical Attacks (PA) Basics
  • Physical Attacks and Countermeasures
  • Building Secure Systems
  • Modular Exponentiation (ME) Basics
  • ME in Cryptography
  • ME Implementation and Vulnerability
  • Montgomery Reduction
  • Week 3 Overview
  • Quiz
  • Side Channel Attacks and Countermeasures
  • Introduction to Side Channel Attacks
  • Memory Vulnerabilities and Cache Attacks
  • Power Analysis
  • More Attacks and Countermeasures
  • Modified Modular Exponentiation
  • Week 4 Overview
  • Quiz
  • Hardware Trojan Detection and Trusted IC Design
  • Hardware Trojan (HT) and Trusted IC
  • Hardware Trojan Taxonomy
  • Hardware Trojan Detection Overview
  • Hardware Trojan Detection Methods
  • Trusted IC Design with HT Prevention
  • Week 5 Overview
  • Quiz
  • Good Practice and Emerging Technologies
  • FPGA Implementation of Crypto
  • Vulnerabilities and Countermeasures in FPGA Systems
  • Role of Hardware in Security and Trust
  • Physical Unclonable Functions (PUF) Basics
  • RO PUF: Reliability
  • Trust Platform Module and Other Good Practices
  • Week 6 Overview
  • Quiz
  • Final Exam
  • Final Exam

Summary of User Reviews

Discover the world of hardware security with this comprehensive course on Coursera. Students have left positive reviews on the course, with a focus on its practicality and real-world applicability.

Key Aspect Users Liked About This Course

Practicality and real-world applicability.

Pros from User Reviews

  • Well-structured and organized course content.
  • Engaging and knowledgeable instructors.
  • Hands-on exercises and projects for practical learning.
  • In-depth coverage of hardware security concepts and techniques.
  • Useful and relevant resources provided for further learning.

Cons from User Reviews

  • Some students found the course material to be too challenging.
  • Limited interaction with instructors for feedback and questions.
  • Not suitable for beginners in hardware security.
  • Course content may become outdated over time.
  • Some technical issues with online platform during course.
English
Available now
Approx. 12 hours to complete
Gang Qu
University of Maryland, College Park
Coursera

Instructor

Gang Qu

  • 4.3 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses