\setcounter{numTAs}{0} \setcounter{totalSections}{2} \def\secNum{{"001","DL1",""}} \def\tenSchFileName{{"","",""}} \def\classTime{{"Thursdays from 12:00 pm to 02:30 pm","Thursdays from 12:00 pm to 02:30 pm",""}} \def\classRm{{"Drosdick Hall 314","either asyncronously (watch recorded video within 2 days) or live on Zoom:",""}} \def\classLive{{"","https://villanova.zoom.us/j/91911969240",""}} \def\classInstructor{{"Danai Chasaki","Danai Chasaki",""}} \def\classInstrContact{{"http://www.ece.villanova.edu/~dchasaki/","http://www.ece.villanova.edu/~dchasaki/",""}} \def\classInstrOffHrs{{"Tuesdays 10-11:30 am","Tuesdays 10-11:30 am",""}} \def\classInstrLive{{"https://villanova.zoom.us/j/5258112428?pwd=d3F1dndCYUtRdWwwUEh2ZDJjQUoxUT09","https://villanova.zoom.us/j/5258112428?pwd=d3F1dndCYUtRdWwwUEh2ZDJjQUoxUT09",""}} \def\TA{{{""},{""},{""}}} \def\TAEmail{{{""},{""},{""}}} \def\TAOffHrs{{{""},{""},{""}}} \def\TARoom{{{""},{""},{""}}} \newcommand\semester{Fall 2025} \newcommand\rsemester{202620} \newcommand\courseNum{ECE 8410} \newcommand\courseName{Trusted Computing} \newcommand\courseCoordinator{Danai Chasaki} \newcommand\credits{3} \newcommand\contactHrs{3} \newcommand\lecture{1} \newcommand\lab{0} \newcommand\undergradCourse{0} \newcommand\isFreshmanCourse{0} \newcommand\isCustomElecPolicy{0} \newcommand\AIPolicyExists{0} \newcommand\isClassLive{1} \newcommand\isLabLive{0} \newcommand\meetingMiscExists{0} \newcommand\isClassInstrLive{1} \newcommand\isLabInstrLive{0} \newcommand\instrMiscExists{0} \newcommand\hasTARoom{0} \newcommand\meetingDesc{, one weekly lecture} \newcommand\meetingMisc{Special notes on meeting info go here, if specified} \newcommand\instructorMisc{Special notes on instructor(s), TA(s) go here, if specified} \newcommand\textBookExists{0} \newcommand\textBookReqd{0} \newcommand\textBookMiscExists{0} \newcommand\referencesExist{0} \newcommand\txtBkAuthExists{0} \newcommand\txtBkPublExists{0} \newcommand\txtBkYrExists{0} \newcommand\txtBkISBNExists{0} \newcommand\textBookTitle{} \newcommand\textBookAuth{} \newcommand\textBookPub{} \newcommand\textBookYr{} \newcommand\textBookISBN{} \newcommand\supplMaterials{Introduction to Hardware Security and Trust by Mohammad Tehranipoor; Springer, 2011} \newcommand\refPapers{References go here, if specified} \newcommand\textBookMisc{Special notes on textbook(s) go here, if specified} \newcommand\catalogDesc{Hardware security topics including embedded systems security hardware Trojans, security in implantable medical devices, security in RFID/NFC, protection from side channel attacks, tamper resistance and crypto processor design, trusted FPGA design/JTAG, hardware-based cryptanalysis.} \newcommand\preReqs{None} \newcommand\coReqs{None} \newcommand\coreRequirement{elective for M.S. in Cybersecurity and M.S. in Computer Engineering} \newcommand\courseExpectation{The goal for students in this course is to learn the fundamentals of hardware security including hardware-based cryptanalysis, hardware Trojans, embedded systems security, security for RFID/NFC, protection from side channel attacks, tamper resistance and crypto processor design, trusted FPGA design.} \newcommand\ABETOutOneA{0} \newcommand\ABETOutOneB{0} \newcommand\ABETOutTwoA{0} \newcommand\ABETOutTwoB{0} \newcommand\ABETOutTwoC{0} \newcommand\ABETOutTwoD{0} \newcommand\ABETOutThree{0} \newcommand\ABETOutFourA{0} \newcommand\ABETOutFourB{0} \newcommand\ABETOutFourC{0} \newcommand\ABETOutFive{0} \newcommand\ABETOutSixA{0} \newcommand\ABETOutSixB{0} \newcommand\ABETOutSevenA{0} \newcommand\ABETOutSevenB{0} \newcommand\covTopics{\item Introduction to hardware security \item Introduction to Cryptography \item Counterfeit Detection and Avoidance \item Fault Injection Attacks \item Watermarking of HW IPs \item Physical Attacks and Tamper resistance \item Side Channel Attacks and Countermeasures, Countermeasures for Embedded Microcontrollers \item Hardware Metering \item Physically Unclonable Functions and True Random Number Generators \item Trusted Design in FPGAs \item Security in Embedded Systems \item Security for RFID Tags \item Hardware Trojans \item Crypto Processor Design} \newcommand\isScheduleExternal{0} \newcommand\isScheduleCommon{1} \newcommand\scheduleRows{18} \newcommand\scheduleCols{3} \newcommand\scheduleHeight{1} \newcommand\schedule{\begin{table}[h!] \centering \caption*{Tentative Schedule for \textbf{All Sections}} \vspace{0.05in} {\renewcommand{\arraystretch}{1.5} \small \begin{tabularx}{\linewidth}{c|c|X} \toprule \large \textbf{Week \#} & \large \textbf{Dates} & \large \textbf{Topics, Reading, etc.}\\ \midrule \midrule 1 & 8/25 - 8/29 & \\ 2 & 9/1 - 9/5 & \\ 3 & 9/8 - 9/12 & \\ 4 & 9/15 - 9/19 & \\ 5 & 9/22 - 9/26 & \\ 6 & 9/29 - 10/3 & \\ 7 & 10/6 - 10/10 & Midterm Exam\\ 8 & 10/13 - 10/17 & Fall break\\ 9 & 10/20 - 10/24 & \\ 10 & 10/27 - 10/31 & \\ 11 & 11/3 - 11/7 & \\ 12 & 11/10 - 11/14 & \\ 13 & 11/17 - 11/21 & \\ 14 & 11/24 - 11/28 & Thanksgiving break\\ 15 & 12/1 - 12/5 & Student presentations\\ 16 & 12/8 - 12/12 & Student presentations\\ 17 & 12/15 - 12/19 & Final Exam\\ \bottomrule \end{tabularx} } \end{table}} \newcommand\gradingPolicy{A composite score (out of 100) will be computed by assigning weights as follows.\\ \\ \textcolor{violet}{ Homework Assignments: 20\% \\ Midterm Exam: 25\% \\ Final Exam: 25\% \\ Project: 30\% \\ } The final grade will be norm-referenced (i.e., "curved").} \newcommand\HWandLabPolicy{Two sets of homework will be assigned during the semester. The assignments will be posted on Blackboard and announced in class. Students will work individually; the due date for each assignment will be given at the time it is assigned. The reports will be collected on Blackboard on the due date at midnight.\\ There will be two exams, midterm and final, scheduled for October 9th and December 18th respectively. Details will be discussed one week prior to the exam.\\ Students are also expected to actively read the state-of-the-art research papers. Each student will research on a “hot” area and submit a 1-3 page proposal before the mid-term exam. Before the final exam submit a 5-10 page summary reporting your findings, and give one presentation to the rest of the class. The schedule of the presentation will be discussed at a later time. The presentations are meant to update fellow students on current trends, technologies, and issues that related to network security. The grades of the presentation come from evaluation from fellow students in the class as well as the instructor. A list of recommended papers will be distributed later in the class. Students are also encouraged to search for their own papers. In this case, you need to get the approval from the instructor for the topic and papers you select to study.\\ Assignments are due as posted on the course web page (or stated in the syllabus). Late submissions will not be accepted unless by prior arrangement with the instructor. Scheduling conflicts regarding exams should be reported to the instructor immediately. In case of a medical emergency, late submission or a make-up exam can be requested if a note from a medical professional is provided.} \newcommand\AIPolicy{\textcolor{red}{ Since you opted for an AI Policy, you should edit this part, choosing one of the following statements, modifying as desired:\\ \\ The use of AI-generated content is not permitted in this course. Its use will result in an academic integrity violation and a zero on the assignment.\\ \\ OR\\ \\ The use of AI-generated content is allowed in this course.\\ \\ OR\\ \\ The use of AI-generated content is permitted as follows: (a) for generating a first draft or (b) for generating an outline or (c) for generating XXX.\\ \\ AND, if AI is allowed:\\ \\ Even if you have significantly edited AI-generated material, you must identify the AI tool used to assist in generating your work. You are required to provide the name of the tool, date used, and prompts used to generate the output. As you may be required to submit the original AI output, you must keep a copy of the original output and provide it when requested. If questions arise about the authorship of submitted work, you are responsible for authenticating your authorship. You should save evidence of your authorial process, such as drafts, notes, version histories, and complete transcripts of AI assistance. }} \newcommand\AttendancePolicy{The primary teaching method will be class lectures and discussions. The lectures will discuss topics presented in the textbook and cover additional material. Class attendance is expected in every class. For students who choose to study asynchronously, the definition of attendance is watching the recorded lectures on Blackboard within two days.} \newcommand\ElectronicsPolicy{\textcolor{red}{Since you opted for a customize electronics policy, you should edit this part. Your policy should address your general stance on recording of class sessions and the circumstances under which recording will be allowed or prohibited. If you generally prohibit recording, yet allow recording of certain classes for some reason, then ypu should notify all students that those classes will be recorded. If recording is permitted as an ADA accommodation for a student, you obviously should not identify that student(s).)}}