Course - Hardware Security in Embedded Systems - IIK4100
Hardware Security in Embedded Systems
About
About the course
Course content
This course aims to equip students with a robust foundation in hardware security, enabling them to effectively address and counter hardware security challenges in critical sector applications. Students will delve into various aspects of hardware security, including the life cycle of integrated circuits, supply chain security, hardware reverse engineering, and practical countermeasures against hardware security threats.
The course also unfolds contemporary and emerging topics like Physical Attacks, Tamper Protections, Lightweight Cryptography, Side-channel attacks, Fault Injection, Hardware Trojan Detection and Prevention in Printed Circuit board (PCB), Memory Extraction through UART/JTAG, Counterfeit Detection and Prevention . Through a blend of theoretical lectures, practical labs, and independent research, students will get a comprehensive understanding and hands-on experience in hardware security in embedded systems.
This course aligns with key UN Sustainable Development Goals (SDGs): SDG 9.1 pertains to secure infrastructure development for economic growth and well-being.; SDGs 17.6 and 17.7 promote technology development, transfer, and dissemination. Sub-Goal 17.7 capacity building encourages sharing knowledge and international cooperation for enhancing global security and sustainable development.
Learning outcome
Knowledge:
- Advance a comprehensive understanding of Hardware Security within Embedded Systems and its importance in critical sector applications.
- Advanced knowledge of the life cycle of integrated circuits, supply chain security, and hardware reverse engineering.
- Understand contemporary and emerging threats and methods for detection and prevention.
Skills:
- Ability to critically analyze existing theories and methods for studying hardware security and to independently apply such methods to related applications.
- Acquire hands-on experience in dealing with hardware security challenges from the chip to the system level through practical labs.
General competence:
- Develop competence in identifying, analyzing, and mitigating hardware security threats in real-world scenarios.
- Develop the capability to conduct independent research in the field of hardware security, contributing to ongoing developments in the domain.
Learning methods and activities
The course is planned with lectures, guest lectures, research-based group discussions and hands-on lab exercises. Lab facilities on campus Gjøvik and Gløshaugen.
The lecture will be accessible to both campus and remote students (Gjøvik and Trondheim). Lectures will take place on campus in Gjøvik and simultaneously streamed via the online learning management system, with best-effort support for remote access.
Compulsory Requirements: To qualify for the exam, students must have two lab works approved. They will be assigned to groups (a maximum of four) to review and provide feedback on each other’s lab work. The course staff will determine the final approval (pass/fail).
Compulsory assignments
- Oblig - Lab
Further on evaluation
Compulsory Requirements: To qualify for the exam, students must have two lab works approved.
Forms of assessment:
The final grade will be based on the written examination (100%), which must be passed (ie, E grade or higher) to pass the course.
Re-sit:
If there is a re-sit examination, the examination form may be changed from written to oral. An ordinary re-sit examination for the written exam in August.
Specific conditions
Admission to a programme of study is required:
Cyber Security and Data Communication (MTKOM)
Digital Infrastructure and Cyber Security (MSTCNNS)
Electronic Systems Design (MSELSYS)
Electronics System Design and Innovation (MTELSYS)
Information Security (MIS)
Information Security (MISD)
Recommended previous knowledge
Students are expected to have a basic understanding of electronic system components and programming skills in C, MATLAB and Python.
Course materials
M. Tehranipoor and C. Wang (Eds.), Introduction to Hardware Security and Trust, Springer, 2011. 2012, ISBN: 978-1-4419-8079-3.
S. Bhunia, M. Tehranipoor, Hardware Security: A Hands-on Learning Approach. Morgan Kaufmann, 2018, ISBN: 9780128124772.
At the beginning of the semester, a comprehensive set of course materials, including presentations, research articles, books, and video recordings, will be provided with electronic learning management systems.
Subject areas
- Applied Information and Communication Technology
Contact information
Course coordinator
Lecturers
Department with academic responsibility
Department of Information Security and Communication Technology
Examination
Examination
Ordinary examination - Autumn 2025
School exam
The specified room can be changed and the final location will be ready no later than 3 days before the exam. You can find your room location on Studentweb.