2017
DOI: 10.1049/iet-cds.2017.0028
|View full text |Cite
|
Sign up to set email alerts
|

Course on secure hardware design of silicon chips

Abstract: This paper describes the design and evaluation of a secure chip design module for graduate students and junior engineers with an electronics and computer engineering. This course has two broad goals, the first is to teach students how design complex systems on chips using industry standard tools and the second is to educate them on emerging hardware security threats and countermeasures. There are a number of strategies currently been employed to handle the rising complexity of chip design, namely: reuse, abstr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 15 publications
0
3
0
1
Order By: Relevance
“…The introduction course is done in the form of a 90 minutes lecture. In the same way, in [9], the authors present a full course dedicated to hardware security. The paper doesn't explain in details the way the course is done.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The introduction course is done in the form of a 90 minutes lecture. In the same way, in [9], the authors present a full course dedicated to hardware security. The paper doesn't explain in details the way the course is done.…”
Section: Related Workmentioning
confidence: 99%
“…The paper doesn't explain in details the way the course is done. More recently, Halak offers a full course on design and evaluation of secure chip [9]. This course seems to contain everything that must contain such a design course about hardware security.…”
Section: Related Workmentioning
confidence: 99%
“…Le document n'explique pas en détail la façon dont le cours est fait. Plus récemment, Basel Halak propose un cours complet sur la conception et l'évaluation de la puce sécurisée (10). Ce cours semble contenir tout ce qui doit contenir un cours de conception sur la sécurité du matériel.…”
Section: Travaux Connexesunclassified
“…Chip authentication and protection have become an essential practice nowadays for strengthening the security of the designs integrated into heterogeneous many-core platforms. Enabling hardware security features has its own advantages such as per chip identification and thwarting software dependent malicious attacks [1,2]. Hardware watermarking has become a typical practice through the years for doing so [3].…”
Section: Introductionmentioning
confidence: 99%