ECE 525: Hardware-Oriented Security and Trust
Instructor: Jim Plusquellic
Department of
ECE,
UNM
HOST Flyer
Course Description
Syllabus
Course Introduction (video)
HOST Introduction (PDF)
HOST Introduction I (video)
Crypto I (PDF)
Crypto I(A) (video)
Crypto I(B) (video)
Crypto I(C) (video)
Crypto II (PDF)
Crypto II(A) (video)
Crypto II(B) (video)
Crypto II(C) (video)
Crypto III (PDF)
Crypto III(A) (video)
Crypto III(B) (video)
Crypto III(C) (video)
PUFs I (PDF)
PUFs I(A) (video)
PUFs I(B) (video)
PUFs I(C) (video)
PUFs I(D) (video)
PUFs I(E) (video)
PUFs I(F) (video)
PUFs I(G) (video)
PUFs II (PDF)
PUFs II(A) (video)
PUFs II(B) (video)
PUFs II(C) (video)
PUFs II(D) (video)
PUFs II(E) (video)
PUFs II(F) (HELP) (video)
PUFs II(G) (HELP) (video)
PUFs II(H) (HELP) (video)
PUFs II(I) (HELP) (video)
PUFs II(J) (HELP) (video)
Authentication Overview (PDF)
Authentication Overview (A) (video)
Authentication Overview (B) (video)
PUF-Based Authentication (PDF)
PUF-Based Authentication (A) (video)
PUF-Based Authentication (B) (video)
PUF-Based Authentication (C) (video)
PUF-Based Authentication Protocols (PDF)
PUF-Based Authentication Protocols (A) (video)
PUF-Based Authentication Protocols (B) (video)
PUF-Based Authentication Protocols (C) (video)
PUF-Based Authentication Protocols (D) (video)
PUF-Based Authentication Protocols (E) (video)
PUF-Based Authentication Protocols (F) (HELP Protocol) (video)
PUF-Based Authentication Protocols (G) (HELP Protocol) (video)
PUF-Based Authentication Protocols (H) (HELP Protocol) (video)
PUF-Based Authentication Protocols (I) (HELP Protocol) (video)
Secure Boot I (PDF)
Secure Boot I(A) (video)
Secure Boot I(B) (video)
Secure Boot I(C) (SASB and BulletProoF) (video)
Secure Boot I(D) (SASB and BulletProoF) (video)
Hardware Trojans I (PDF)
Hardware Trojans I (A) (video)
Hardware Trojans I (B) (video)
Hardware Trojans I (C) (video)
Hardware Trojans I (D) (video)
Hardware Trojans I (E) (video)
Hardware Trojans II (PDF)
Hardware Trojans II (A) (video)
Hardware Trojans II (B) (video)
Hardware Trojans II (C) (video)
Hardware Trojans II (D) (video)
Hardware Trojans II (E) (video)
Hardware Trojans II (F) (video)
Hardware Trojans II (G) (video)
Side-Channel Attacks (PDF)
Side-Channel Attacks (A) (video)
Side-Channel Attacks (B) (video)
Side-Channel Attacks (C) (video)
SCA CounterMeasures I (PDF)
SCA CounterMeasures (A) (video)
SCA CounterMeasures (B) (video)
SCA CounterMeasures (C) (video)
SCA CounterMeasures II (PDF)
SCA CounterMeasures II (A) (SPREAD) (video)
SCA CounterMeasures II (B) (SPREAD) (video)
Obfuscation I (PDF)
Study Guide Questions
HOST Introduction
Crypto I
Crypto II
Crypto III
PUFs I
PUFs II
Authentication Overview
PUF-Based Authentication
PUF-Based Authentication Protocols
Secure Boot I
Hardware Trojans I
Hardware Trojans II
Side-Channel Attacks
SCA CounterMeasures I
SCA CounterMeasures II
Book Chapters
-
PUF-Based Authentication, J. Plusquellic
-
Detecting Hardware Trojans using Delay Analysis, J. Plusquellic and F. Saqib
Supplemental Material
-
Hardware Trojans III (PDF)
-
Practical Aspects of PUFs
-
Statistics
-
Software and Hardware Tradeoffs
-
Manufacturing Test Basics
-
RSA
-
DES
Announcements
-
Sample midterm exam
Links
AES Crypto Core
Project twofish
index
FIPS-197
KAT AES
TripleDES vectors
AESAVS
"Implementation of DES Algorithm Using FPGA Technology", Arnaud Lagger, Ilhan Hatirnaz, and Yusuf Leblebici
"A VHDL Implemetation of the Advanced Encryption Standard-Rijndael Algorithm", Rajender Manteena
Diffie-Hellman key exchange -- plug in the keyword 'Diffie-Hellman' in wikipedia
"Videos on the Enigma machine
Avi Kak (kak@purdue.edu): RSA Lecture 12
Stefan Mangard, Elisabeth Oswald and Thomas Popp, "Power Analysis Attacks, Revealing the Secrets of Smart Cards" SpringLink Text (on line)
Birthday paradox
News Articles
-
"The chip industry's open secret: Adversaries' military tech relies on U.S. components", Kristina Partsinevelos and Cait Freda, 2023
-
"New Evidence of Hacked Supermicro Hardware Found in U.S. Telecom", 10/9/2018
-
"The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies", 10/4/2018
-
"A Critical Intel Flaw Breaks Basic Security for Most Computers", 1/3/2018
-
"Intel Confronts Potential ‘PR Nightmare’ With Reported Chip Flaw", 1/3/2018
-
"DHS, FBI Warn of Cyberattack Threat to Nation's Power Grid", 4/10/2016
-
"FBI says car hacking is a real risk", 3/18/2016
-
"Inside the Cunning, Unprecedented Hack of Ukraine's Power Grid", 3/3/2016
-
"Comcast Security Flaw Could Help Burglars Break into Homes Undetected", 1/5/2016
-
"Hackers Remotely Kill a Jeep on the Highway - With Me in It", 7/21/2015
-
"California Could Require a 'Kill Switch' for Every Smartphone", 2/7/2014
-
Spy agencies shun Lenovo, finding backdoors built into the hardware, 6/30/2013
-
How I Hacked An Electronic Voting Machine by By Roger Johnston, 11/5/2012
-
"Defense Logistics Agency, Combating Counterfeits, by Beth Reece
-
"Applied DNA Science Product Description SigNature
-
"PUF - Physical Unclonable Function: Protecting next-generation Smart Card ICs with SRAM-based PUFs
-
"Reflections on Trusting Trust by Ken Thompson", Aug. 1984
-
"Backdoor (computing)"
-
"Cyberattacks on Iran -- Stuxnet and Flame", NORMAN ASA, via PR Newswire, Aug. 9th, 2012
-
"ALLARD: Who leaked the Stuxnet virus attack on Iran?", By Col. Ken Allard, Jan. 18th, 2013
-
"Los Alamos replaces computer switches because of security concerns, Jan. 13th, 2013
-
"Gone in 3 Minutes: Keyless BMWs a Boon to Hacker Thieves", Kim Zetter, wired.com, July 10th, 2012
-
"Chinese Microchips Are Considered Impossible To Regulate", David Fulghum, Bill Sweetman, Jen DiMascio, June 4th, 2012
-
"Experts dispute threat posed by backdoor found in Chinese chip", Steven Musil, May 29th, 2012
-
"Report reveals fake chips in U.S. military hardware", Peter Clarke, May 23, 2012
-
"Clamping Down on Counterfeits", Tam Harbert, February 22, 2012
-
"State of SCADA Security Worries Researchers", Feb. 2012
-
"Researchers: Don't trust satellite phones", encryption broken, Feb. 2012
-
"Counterfeit Parts Found on P-8 Posiedons", DefenseTech, November 8th, 2011
-
"U.S. official says pre-infected computer tech entering country", M. Alex Johnson, MSNBC, July 8th, 2011
-
"The Navy Bought Fake Chinese Microchips That Could Have Disarmed U.S. Missiles", Robert Johnson, Business Insider, June 27th, 2011
-
"The Hunt for the Kill Switch", Sally Adee, IEEE Spectrum, May 2008
-
"Counterfeit Chips Raise Big Hacking, Terror Threats, Experts Say", Glenn Derene and Joe Pappalardo, Popular Mechanics, April 2008
-
"Fairy Dust, Secrets, and the Real World", S.W. Smith, Security and Privacy
-
"Princeton Professor Finds No Hardware Security In E-Voting Machine", Antone Gonsalves, InformationWeek, Feb. 2007
-
"Cunning Circuits Confound Crooks", Brian Dipert, EDN, 2000
-
"Secure Chips for Gadgets Set to Soar", John P. Mello Jr,, TechNewsWorld, 2007
-
"Six Decades of Cryptography", Rodney Gedda, 2009 (Courtesy of Colby)
-
"Old Trick Threatens the Newest Weapons", JOHN MARKOFF, New York Times, Science, Oct 27th, 2009
-
Can DARPA Fix the Cybersecurity 'Problem From Hell?, Aug, 2011
-
"Good Chip, Bad Chip, Evil Chip: Viterbi Experts Developing Tests to Tell Which is Which", July, 2011
Government Hardware Trojan Reports
-
"Defense Science Board Task Force On HIGH PERFORMANCE MICROCHIP SUPPLY", Office of the Under Secretary of Defense, Feb. 2005
-
"White Paper: National Security Aspects of the Global Migration of the U.S. Semiconductor Industry", Senator Joseph I. Lieberman, June 2003
-
"TRUST, A Proposed Plan for Trusted Integrated Circuits", Dean. R. Collins, Deputy Director Microsystems Technology Office, DARPA
Supplimentary Reading
-
Handbook of Applied Cryptography, A. J. Menezes, P. C. van Oorschot and S. A. Vanstone
-
Physical Unclonable Functions, Constructions, Properties and Applications, R. Maes
Papers
-
"Trojan Detection using IC Fingerprinting", Dakshi Agrawal, Selcuk Baktir, Deniz Karakoyunlu, Pankaj Rohatgi and Berk Sunar, Symposium on Security and Privacy, 2007
-
"Physical One-Way Functions", Ravikanth Pappu, Ben Recht, Jason Taylor, Neil Gershenfeld, Science, Vol. 297. no. 5589, Sept. 2002, pp. 2026-2030.
Laboratory Support
-
Download sts-2.1.1.zip from NIST site, untar, compile and run either one or more of the data sets in the NIST 'data' directory.
-
Diehard test suite
ZYBO:
-
Digilent ZYBO Z7-10 Board Website
-
NOTE: The ZYBO Z7-10 does NOT ship with a microSD, a microUSB or a short ethernet cable. You must also buy these at your favorite place on-line or Walmart/Target.
-
ZYBO Z7-10 Master XDC file
-
ZYBO Z7-10 Boot Files
-
ZYBO Z7-10 Board Files (Add these files to (Xilinx_install_dir)/Vivado/2017.2/data/boards/board_files/zybo-z7-10/A.0/ directory)
-
ZYBO Z7-10 Boot Files with sqlite3 + JTAG
CORA:
-
Digilent Cora Z7 Board Website
-
NOTE: The Cora Z7-07S does NOT ship with a microSD, a microUSB or a short ethernet cable. You must also buy these at your favorite place on-line or Walmart/Target.
-
Cora Z7-07S Master XDC file
-
CORA Z7-10 Boot Files
-
CORA Z7-07S Board Files (Add these files to (Xilinx_install_dir)/Vivado/2017.2/data/boards/board_files/cora-z7-07s/B.0/ directory)
FPGA Links:
Zynq SoC Overview
Ivan Bow's tutorial on how to run linux on a Window's 10 machine
Laboratory Lectures:
Vivado: Installation, Part A (video)
Vivado: Installation, Part B (video)
SDK Instruction, HELP Enrollment (video)
Network instructions (PDF)
Lab Grading Criteria (applies to all labs except Lab0) (PDF)
Project
-
Jim Plusquellic /
ECE /