Checking date: 03/04/2025 14:44:05


Course: 2025/2026

High Security Integrated Circuit Design
(20101)
Master in Microelectronic Design Engineering (Plan: 546 - Estudio: 410)
EPI


Coordinating teacher: MARTIN GONZALEZ, HONORIO

Department assigned to the subject: Electronic Technology Department

Type: Electives
ECTS Credits: 3.0 ECTS

Course:
Semester:




Requirements (Subjects that are assumed to be known)
- Digital Microelectronics - Integrated Circuits Implementation I - Integrated Circuits Implementation II
Objectives
1) Understand the specific threats and vulnerabilities of hardware and embedded systems, as well as the importance of physical security in critical environments where hardware protection is essential. 2) Explore and implement modern cryptographic primitives in hardware, including classical and post-quantum algorithms, random number generators (TRNG/DRNG), and physically unclonable functions (PUFs), evaluating their applicability and security. 3) Analyze physical attacks on hardware, including side-channel and fault injection attacks, understanding their principles, means of execution, and practical limitations, and proposing effective countermeasures to mitigate their effects. 4) Evaluate the trust and integrity of hardware throughout its lifecycle, identifying risks such as counterfeiting, piracy, and hardware Trojans, and proposing mechanisms to mitigate these issues. 5) Apply both practical and conceptual knowledge to design secure hardware solutions, taking into account both external and internal threats during the development and deployment phases.
Learning Outcomes
Description of contents: programme
1. Introduction to Hardware Security 1.1 Threats and vulnerabilities in hardware and embedded systems. 1.2 Relevance of physical and hardware security in critical environments. 2. Cryptographic Primitives 2.1 Classical and post-quantum ciphers and cryptographic algorithms. Practical implementations. 2.2 Random number generation in hardware (TRNG, DRNG). 2.3 Physically Unclonable Functions (PUFs) 3. Side-Channel Attacks (SCA) 3.1 Attack Principles 3.2 Practical Considerations and Types of SCA 3.3 Practical Countermeasure Design against SCA 4. Fault Injection Attacks (FI) 4.1 FI Methods and Their Effects 4.2 Countermeasures 5. Trusted Hardware 5.1 Trust Issues during the Integrated Circuit Lifecycle 5.2 Counterfeiting and Piracy 5.3 Hardware Trojans
Assessment System
  • % end-of-term-examination/test 35
  • % of continuous assessment (assigments, laboratory, practicals...) 65




Basic Bibliography
  • Emmanuel Prouff, Guenael Renault, Mattieu Rivain, Colin O'Flynn . Embedded Cryptography 1. Wiley. 2025
  • Emmanuel Prouff, Guenael Renault, Mattieu Rivain, Colin O'Flynn . Embedded Cryptography 2. Wiley. 2025
  • Jasper van Woudenberg, Colin O'Flynn. The hardware hacking handbook : breaking embedded security with hardware attacks. No Starch Press. 2024
  • Mark Tehranipoor N. Nalla Anandakumar Farimah Farahmandi. Hardware Security Training, Hands-on!. Springer. 2023

The course syllabus may change due academic events or other reasons.