course-details-portlet

IIK4100

Hardware Security in Embedded Systems

Credits 7.5
Level Second degree level
Course start Autumn 2025
Duration 1 semester
Language of instruction Norwegian
Location Gjøvik and Trondheim
Examination arrangement School exam

About

About the course

Course content

This course aims to equip students with a robust foundation in hardware security, enabling them to effectively address and counter hardware security challenges in critical sector applications. Students will delve into various aspects of hardware security, including the life cycle of integrated circuits, supply chain security, hardware reverse engineering, and practical countermeasures against hardware security threats.

The course also unfolds contemporary and emerging topics like Physical Attacks, Tamper Protections, Lightweight Cryptography, Side-channel attacks, Fault Injection, Hardware Trojan Detection and Prevention in Printed Circuit board (PCB), Memory Extraction through UART/JTAG, Counterfeit Detection and Prevention . Through a blend of theoretical lectures, practical labs, and independent research, students will get a comprehensive understanding and hands-on experience in hardware security in embedded systems.

This course aligns with key UN Sustainable Development Goals (SDGs): SDG 9.1 pertains to secure infrastructure development for economic growth and well-being.; SDGs 17.6 and 17.7 promote technology development, transfer, and dissemination. Sub-Goal 17.7 capacity building encourages sharing knowledge and international cooperation for enhancing global security and sustainable development.

Learning outcome

Knowledge:

  • Advance a comprehensive understanding of Hardware Security within Embedded Systems and its importance in critical sector applications.
  • Advanced knowledge of the life cycle of integrated circuits, supply chain security, and hardware reverse engineering.
  • Understand contemporary and emerging threats and methods for detection and prevention.

Skills:

  • Ability to critically analyze existing theories and methods for studying hardware security and to independently apply such methods to related applications.
  • Acquire hands-on experience in dealing with hardware security challenges from the chip to the system level through practical labs.

General competence:

  1. Develop competence in identifying, analyzing, and mitigating hardware security threats in real-world scenarios.
  2. Develop the capability to conduct independent research in the field of hardware security, contributing to ongoing developments in the domain.

Learning methods and activities

The course is planned with lectures, guest lectures, research-based group discussions and hands-on lab exercises. Lab facilities on campus Gjøvik and Gløshaugen.

The lecture will be accessible to both campus and remote students (Gjøvik and Trondheim). Lectures will take place on campus in Gjøvik and simultaneously streamed via the online learning management system, with best-effort support for remote access.

Compulsory Requirements: To qualify for the exam, students must have two lab works approved. They will be assigned to groups (a maximum of four) to review and provide feedback on each other’s lab work. The course staff will determine the final approval (pass/fail).

Compulsory assignments

  • Oblig - Lab

Further on evaluation

Compulsory Requirements: To qualify for the exam, students must have two lab works approved.

Forms of assessment:

The final grade will be based on the written examination (100%), which must be passed (ie, E grade or higher) to pass the course.

Re-sit:

If there is a re-sit examination, the examination form may be changed from written to oral. An ordinary re-sit examination for the written exam in August.

Specific conditions

Admission to a programme of study is required:
Cyber Security and Data Communication (MTKOM)
Digital Infrastructure and Cyber Security (MSTCNNS)
Electronic Systems Design (MSELSYS)
Electronics System Design and Innovation (MTELSYS)
Information Security (MIS)
Information Security (MISD)

Course materials

M. Tehranipoor and C. Wang (Eds.), Introduction to Hardware Security and Trust, Springer, 2011. 2012, ISBN: 978-1-4419-8079-3.

S. Bhunia, M. Tehranipoor, Hardware Security: A Hands-on Learning Approach. Morgan Kaufmann, 2018, ISBN: 9780128124772.

At the beginning of the semester, a comprehensive set of course materials, including presentations, research articles, books, and video recordings, will be provided with electronic learning management systems.

Subject areas

  • Applied Information and Communication Technology

Contact information

Course coordinator

Lecturers

Department with academic responsibility

Department of Information Security and Communication Technology

Examination

Examination

Examination arrangement: School exam
Grade: Letter grades

Ordinary examination - Autumn 2025

School exam
Weighting 100/100 Examination aids Code D Date 2025-11-28 Time 09:00 Duration 3 hours Exam system Inspera Assessment
Place and room for school exam

The specified room can be changed and the final location will be ready no later than 3 days before the exam. You can find your room location on Studentweb.

Sluppenvegen 14
Room SL311 grønn sone
6 candidates
Smaragd
Room S411
21 candidates
Room S415
9 candidates

Re-sit examination - Summer 2026

School exam
Weighting 100/100 Examination aids Code D Duration 3 hours Exam system Inspera Assessment Place and room Not specified yet.