Main page | Study Branches/Specializations | Groups of Courses | All Courses | Roles                Instructions

A course is the basic teaching unit, it's design as a medium for a student to acquire comprehensive knowledge and skills indispensable in the given field. A course guarantor is responsible for the factual content of the course.
For each course, there is a department responsible for the course organisation. A person responsible for timetabling for a given department sets a time schedule of teaching and for each class, s/he assigns an instructor and/or an examiner.
Expected time consumption of the course is expressed by a course attribute extent of teaching. For example, extent = 2 +2 indicates two teaching hours of lectures and two teaching hours of seminar (lab) per week.
At the end of each semester, the course instructor has to evaluate the extent to which a student has acquired the expected knowledge and skills. The type of this evaluation is indicated by the attribute completion. So, a course can be completed by just an assessment ('pouze zápočet'), by a graded assessment ('klasifikovaný zápočet'), or by just an examination ('pouze zkouška') or by an assessment and examination ('zápočet a zkouška') .
The difficulty of a given course is evaluated by the amount of ECTS credits.
The course is in session (cf. teaching is going on) during a semester. Each course is offered either in the winter ('zimní') or summer ('letní') semester of an academic year. Exceptionally, a course might be offered in both semesters.
The subject matter of a course is described in various texts.

MI-HWB.16 Hardware Security Extent of teaching: 2P+2C
Instructor: Completion: Z,ZK
Department: 18106 Credits: 5 Semester: L

Annotation:
The course provides the knowledge needed for the analysis and design of computer systems security solutions. Students get an overview of safeguards against abuse of the system using hardware means. They will be able to safely use and integrate hardware components into systems and test them for resistance to attacks. Students will gain knowledge about the cryptographic accelerators, PUF, random number generators, smart cards, biometric devices, and devices for internal security functions of the computer.

Lecture syllabus:
1. Design of hardware security modules.
2. Cryptographic accelerators.
3. HW resources for authentication operations.
4. Utilization of sensor data for security.
5. Types of side channels, the impact of technology and architecture.
6. Power and electromagnetic side-channel analysis, power analysis.
7. Differential power analysis.
8. Defense against side-channel attacks.
9. Resistance to tampering - monitors of physical parameters.
10. Securing code execution (trusted platform), security storage.
11. HW malware - detection and prevention, fault injection.
12. Protection of intellectual property, protection of FPGA bitstream.
13. Design of PUF & TRNG.

Seminar syllabus:
1. Introduction to measurement with oscilloscope and smart card
2. Measurement with oscilloscope, data transfer to PC
3. Differential power analysis
4. DPA - power models, evaluation methods
5. Trace alignment and compression
6. Attacking countermeasures - hiding in time
7. Attacking hiding in time
8. Analysis of correlation with instructions
9. Analysis of correlation with instructions
10. Attacking masking
11. Task finalization
12. Task finalization, credit

Literature:
1. Menezes, A. - Oorschot, P. - Vanstone, S.: Handbook of Applied Cryptography. CRC Press. 1996. 0849385237.
2. Paar, C. - Pelzl, J.: Understanding Cryptography. Springer. 2010. 978-3-642-04100-6.
3. Rankl, W. - Effing, W.: Smart Card Handbook (3rd Edition). Wiley. 2004. 978-0-470-85669-7.
4. Anderson, R. J.: Security Engineering: A Guide to Building Dependable Distributed Systems (2nd Edition). Wiley. 2008. 978-0-470-06852-6.
5. Vacca, J. R.: Biometric Technologies and Verification Systems. Elsevier. 2007. 978-0-7506-7967.
6. Ecks, M.: Smartcard development with JavaCard and the OpenCard Framework: A feasibility study. VDM Verlag Dr. Müller. 2008. 3836499894.

Requirements:
Basics of computer security and cryptography, programming

Tento předmět obsahově navazuje na bakalářský předmět Hardwarová bezpečnost
https://courses.fit.cvut.cz/MI-HWB/

The course is also part of the following Study plans:
Study Plan Study Branch/Specialization Role Recommended semester
MI-NPVS.2016 Design and Programming of Embedded Systems V 2
NI-TI.2018 Computer Science V 2
MI-SP-SP.2016 System Programming V 2
MI-SP-TI.2016 System Programming V 2
MI-WSI-ISM.2016 Web and Software Engineering V 2
MI-PSS.2016 Computer Systems and Networks V 2
MI-WSI-SI.2016 Web and Software Engineering V 2
MI-PB.2016 Computer Security PO 2
MI-SPOL.2016 Unspecified Branch/Specialisation of Study VO 2
MI-ZI.2016 Knowledge Engineering V 2
MI-ZI.2018 Knowledge Engineering V 2
MI-WSI-WI.2016 Web and Software Engineering V 2


Page updated 29. 3. 2024, semester: L/2021-2, Z,L/2023-4, Z/2021-2, Z/2020-1, Z/2019-20, L/2020-1, Z,L/2022-3, L/2019-20, Send comments to the content presented here to Administrator of study plans Design and implementation: J. Novák, I. Halaška