Design Methods for Hardware Security and Trust

Christian Pilato · 26/12/2025

This course provides a comprehensive introduction to hardware security and trust, covering the major threats that arise from the design, manufacturing, and deployment of integrated circuits and systems. Students will explore key attacks (including counterfeiting, hardware trojans, transient execution attacks, fault attacks, and side-channel attacks) and learn state-of-the-art design methods to prevent, detect, and tolerate these threats. The course emphasizes practical methodologies for embedding security and trust into hardware design, verification, and supply chain management. 

About Instructor

Not Enrolled
This course is currently closed