This course provides a comprehensive introduction to hardware security and trust, covering the major threats that arise from the design, manufacturing, and deployment of integrated circuits and systems. Students will explore key attacks (including counterfeiting, hardware trojans, transient execution attacks, fault attacks, and side-channel attacks) and learn state-of-the-art design methods to prevent, detect, and tolerate these threats. The course emphasizes practical methodologies for embedding security and trust into hardware design, verification, and supply chain management.
About Instructor