Jump to content

SIL781

From IITD Wiki
Revision as of 10:24, 4 March 2026 by Prashantt492 (talk | contribs) (Creating course page via bot)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
SIL781
Secure Hardware-based System Design
Credits 4
Structure 3-0-2
Pre-requisites
Overlaps

SIL781 : Secure Hardware-based System Design

[edit]

Prerequisite(s) : COL216, ELL305 Overview of Different Issues of Hardware Security, Useful Hardware Security Primitives: Cryptographic Hardware and their Implementation, Optimization of Cryptographic Hardware on FPGA, Physically Unclonable Functions (PUFs) with implementations and quality evaluation Side-channel Attacks on Cryptographic Hardware: Basic Idea, Prevention, Improved Side-channel Attack Algorithms, Cache Attacks, Testability and Verification of Cryptographic Hardware: Fault-tolerance of Cryptographic Hardware, Fault Attacks, Verification of Finite-field Arithmetic Circuits, Modern IC Design and Manufacturing Practices and Their Implications: Hardware Intellectual Property (IP) Piracy and IC Piracy, Prevention of IP and IC Piracy, Hardware Piracy, Model Building Attacks on PUFs, Hardware Trojans: Nomenclature and Operating Modes, Countermeasures, Techniques for Trojan Detection, Techniques to Increase Testing Sensitivity Infrastructure Security: Impact of Hardware Security Compromise on Public Infrastructure, Defense Techniques. JCp781 Data Structures and Algorithms Lab 1 Credit (0-0-2) Prerequisite(s) :Computer programming. This course is to be taken in conjunction with ELL781 and covers the lab component of the theory covered there. This course is to be taken in conjunction with ELL781 and covers the lab component of the theory covered there viz Basics of algorithm analysis. Elementary data structures. Hashing, Analysis of collision resolution techniques.Priority queues. Dynamic programming: rod cutting problem, matrix multiplication, longest common sequence, optimal binary search tree. Greedy algorithms: Huffman coding, activity selection problem, knapsack problem. Sparse Matrices manipulation. String matching, Matching DNA sequences. JCp810 Cyber Security and Information Assurance Lab 1 Credit (0-0-2) Prerequisite(s) :To be taken in parallel with ELL810. This is for lab component of the topics covered in ELL810 This is a lab only course to be taken in conjunction with ELL810. The labs will be on topics covered therein viz Basics of computer and networks security along with vulnerabilities in existing software interfaces, such as buffer overflows, unsafe libc functions, filesystem design issues, etc. The associated threat, attack, adversary models, identity representation, management and access control, intrusion detection, security at different levels: network, system, user, program security, network security, wireless security, mobile security, hardware security and the security of cyber physical systems. M.Tech. programme in Robotics