\setcounter{numTAs}{0} \setcounter{totalSections}{2} \def\secNum{{"001","DL1",""}} \def\tenSchFileName{{"","",""}} \def\classTime{{"Tuesdays 12-2:30 pm","Tuesdays 12-2:30 pm",""}} \def\classRm{{"CEER 312 (masks required)","either asyncronously (watch recorded video within 2 days) or live on Zoom: https://villanova.zoom.us/j/94302339775",""}} \def\classLive{{"","",""}} \def\classInstructor{{"Danai Chasaki","Danai Chasaki",""}} \def\classInstrContact{{"http://www.ece.villanova.edu/~dchasaki/","http://www.ece.villanova.edu/~dchasaki/",""}} \def\classInstrOffHrs{{"Tuesdays 10-11:30 am on Zoom: https://villanova.zoom.us/j/98122200832","Tuesdays 10-11:30 am on Zoom: https://villanova.zoom.us/j/98122200832",""}} \def\classInstrLive{{"","",""}} \def\TA{{{""},{""},{""}}} \def\TAEmail{{{""},{""},{""}}} \def\TAOffHrs{{{""},{""},{""}}} \def\TARoom{{{""},{""},{""}}} \newcommand\semester{Fall 2021} \newcommand\rsemester{202220} \newcommand\courseNum{ECE 8410} \newcommand\courseName{Trusted Computing} \newcommand\courseCoordinator{Danai Chasaki} \newcommand\credits{3} \newcommand\contactHrs{3} \newcommand\lecture{1} \newcommand\lab{0} \newcommand\undergradCourse{0} \newcommand\isFreshmanCourse{0} \newcommand\isCustomElecPolicy{0} \newcommand\isClassLive{0} \newcommand\isLabLive{0} \newcommand\meetingMiscExists{0} \newcommand\isClassInstrLive{0} \newcommand\isLabInstrLive{0} \newcommand\instrMiscExists{0} \newcommand\hasTARoom{0} \newcommand\meetingDesc{, one weekly lecture} \newcommand\meetingMisc{Special notes on meeting info go here, if specified} \newcommand\instructorMisc{Special notes on instructor(s), TA(s) go here, if specified} \newcommand\textBookExists{0} \newcommand\textBookReqd{0} \newcommand\textBookMiscExists{0} \newcommand\referencesExist{0} \newcommand\txtBkAuthExists{0} \newcommand\txtBkPublExists{0} \newcommand\txtBkYrExists{0} \newcommand\txtBkISBNExists{0} \newcommand\textBookTitle{} \newcommand\textBookAuth{} \newcommand\textBookPub{} \newcommand\textBookYr{} \newcommand\textBookISBN{} \newcommand\supplMaterials{Introduction to Hardware Security and Trust by Mohammad Tehranipoor; Springer, 2011} \newcommand\refPapers{References go here, if specified} \newcommand\textBookMisc{Special notes on textbook(s) go here, if specified} \newcommand\catalogDesc{Hardware security topics including embedded systems security hardware Trojans, security in implantable medical devices, security in RFID/NFC, protection from side channel attacks, tamper resistance and crypto processor design, trusted FPGA design/JTAG, hardware-based cryptanalysis.} \newcommand\preReqs{Undergraduate level knowledge of digital logic design} \newcommand\coReqs{None} \newcommand\coreRequirement{elective for M.S. in Cybersecurity and M.S. in Computer Engineering} \newcommand\courseExpectation{The goal for students in this course is to learn the fundamentals of hardware security including hardware-based cryptanalysis, hardware Trojans, embedded systems security, security for RFID/NFC, protection from side channel attacks, tamper resistance and crypto processor design, trusted FPGA design.} \newcommand\ABETOutOne{0} \newcommand\ABETOutTwo{0} \newcommand\ABETOutThree{0} \newcommand\ABETOutFour{0} \newcommand\ABETOutFive{0} \newcommand\ABETOutSix{0} \newcommand\ABETOutSeven{0} \newcommand\covTopics{\item Introduction to hardware security \item Introduction to Cryptography \item Counterfeit Detection and Avoidance \item Fault Injection Attacks \item Watermarking of HW IPs \item Physical Attacks and Tamper resistance \item Side Channel Attacks and Countermeasures, Countermeasures for Embedded Microcontrollers \item Hardware Metering \item Physically Unclonable Functions and True Random Number Generators \item Trusted Design in FPGAs \item Security in Embedded Systems \item Security for RFID Tags \item Hardware Trojans \item Crypto Processor Design} \newcommand\isScheduleExternal{0} \newcommand\isScheduleCommon{1} \newcommand\scheduleRows{18} \newcommand\scheduleCols{3} \newcommand\scheduleHeight{1} \newcommand\schedule{\begin{table}[h!] \centering \caption*{Tentative Schedule for \textbf{All Sections}} \vspace{0.05in} {\renewcommand{\arraystretch}{1.5} \small \begin{tabularx}{\linewidth}{c|c|X} \toprule \large \textbf{Week \#} & \large \textbf{Dates} & \large \textbf{Topics, Reading, etc.}\\ \midrule \midrule 1 & 8/23 - 8/27 & \\ 2 & 8/30 - 9/3 & \\ 3 & 9/6 - 9/10 & \\ 4 & 9/13 - 9/17 & \\ 5 & 9/20 - 9/24 & \\ 6 & 9/27 - 10/1 & \\ 7 & 10/4 - 10/8 & Midterm Exam\\ 8 & 10/11 - 10/15 & Fall break\\ 9 & 10/18 - 10/22 & \\ 10 & 10/25 - 10/29 & \\ 11 & 11/1 - 11/5 & \\ 12 & 11/8 - 11/12 & \\ 13 & 11/15 - 11/19 & \\ 14 & 11/22 - 11/26 & Thanksgiving break\\ 15 & 11/29 - 12/3 & Student presentations\\ 16 & 12/6 - 12/10 & Student presentations, 12/9 final day of classes\\ 17 & 12/13 - 12/17 & Final Exam\\ \bottomrule \end{tabularx} } \end{table}} \newcommand\gradingPolicy{A composite score (out of 100) will be computed by assigning weights as follows.\\ \\ \textcolor{violet}{ Homework Assignments: 20\% \\ Midterm Exam: 25\% \\ Final Exam: 25\% \\ Project: 30\% \\ } The final grade will be norm-referenced (i.e., "curved").} \newcommand\HWandLabPolicy{Two sets of homework will be assigned during the semester. The assignments will be posted on Blackboard and announced in class. Students will work individually; the due date for each assignment will be given at the time it is assigned. The reports will be collected on Blackboard on the due date at midnight.\\ There will be two exams, midterm and final, scheduled for the week of October 5th and the week of December 14th respectively. Details will be discussed one week prior to the exam.\\ Students are also expected to actively read the state-of-the-art research papers. Each student will research on a “hot” area and submit a 1-3 page proposal before the mid-term exam. Before the final exam submit a 5-10 page summary reporting your findings, and give one presentation to the rest of the class. The schedule of the presentation will be discussed at a later time. The presentations are meant to update fellow students on current trends, technologies, and issues that related to network security. The grades of the presentation come from evaluation from fellow students in the class as well as the instructor. A list of recommended papers will be distributed later in the class. Students are also encouraged to search for their own papers. In this case, you need to get the approval from the instructor for the topic and papers you select to study.\\ Assignments are due as posted on the course web page (or stated in the syllabus). Late submissions will not be accepted unless by prior arrangement with the instructor. Scheduling conflicts regarding exams should be reported to the instructor immediately. In case of a medical emergency, late submission or a make-up exam can be requested if a note from a medical professional is provided.} \newcommand\AttendancePolicy{The primary teaching method will be class lectures and discussions. The lectures will discuss topics presented in the textbook and cover additional material. Class attendance is expected in every class. For students who choose to study asynchronously, the definition of attendance is watching the recorded lectures on Blackboard within two days. Please wear your masks at all times in CEER 312.} \newcommand\ElectronicsPolicy{\textcolor{red}{Since you opted for a customize electronics policy, you should edit this part. Your policy should address your general stance on recording of class sessions and the circumstances under which recording will be allowed or prohibited. If you generally prohibit recording, yet allow recording of certain classes for some reason, then ypu should notify all students that those classes will be recorded. If recording is permitted as an ADA accommodation for a student, you obviously should not identify that student(s).)}}