- Physical attacks and "tamper resistance"
- Side-channel attacks and countermeasures
- Introduction to lightweight cryptography
- Security for smart card and radio frequency identification tags (RFID-tags)
- Design for physical unclonable functions (PUFs) and true random number generators
- Personal integrity in the Internet-of-Things era
IL1333 Hardware Security 7.5 credits
This course in Hardware Security equips you with the cutting-edge skills to protect electronic systems from sophisticated physical and side-channel attacks while balancing performance and cost considerations. In an increasingly connected world, the security of hardware systems is paramount. The need for robust, tamper-resistant solutions, from smart cards to RFID tags and IoT devices, is critical.
About course offering
For course offering
Spring 2025 Start 14 Jan 2025 programme students
Target group
Open to all programmes as long as it can be included in your programme.
Part of programme
Bachelor's Programme in Information and Communication Technology, åk 2, Recommended
Bachelor's Programme in Information and Communication Technology, åk 3, Recommended
Degree Programme in Computer Engineering, åk 2, Recommended
Degree Programme in Computer Engineering, åk 3, DPU2, Recommended
Degree Programme in Computer Engineering, åk 3, SAIN, Mandatory
Degree Programme in Electronics and Computer Engineering, åk 3, Recommended
Degree Programme in Information and Communication Technology, åk 2, Conditionally Elective
Degree Programme in Information and Communication Technology, åk 3, Conditionally Elective
Master's Programme, Communication Systems, åk 1, ITE, Recommended
Master's Programme, Communication Systems, åk 1, SMK, Recommended
Master's Programme, Communication Systems, åk 1, TRN, Recommended
Master's Programme, Cybersecurity, åk 1, Conditionally Elective
Master's Programme, Cybersecurity, åk 2, Conditionally Elective
Periods
P3 (7.5 hp)Duration
Pace of study
50%
Form of study
Normal Daytime
Language of instruction
English
Course location
KTH Kista
Number of places
25 - 100
Planned modular schedule
Course memo
Course memo is not publishedSchedule
Schedule is not publishedApplication
For course offering
Spring 2025 Start 14 Jan 2025 programme students
Application code
60086
Contact
For course offering
Spring 2025 Start 14 Jan 2025 programme students
Contact
Elena Dubrova
Examiner
No information insertedCourse coordinator
No information insertedTeachers
No information insertedContent and learning outcomes
Course contents
Intended learning outcomes
Having passed the course, the student shall be able to
- describe state-of-the-art hardware security techniques and justify their applications and limitations
- describe how the safety is guaranteed in an illustrating application
- describe the threats against a system from hardware perspective and available countermeasures and apply the knowledge to choose an appropriate set of countermeasures for a certain threat assessment.
- analyse and make a critical balance between the performance, cost and safety of the system and illustrate compromises that are available for design engineers of electronic and embedded systems
- explain the need of hardware security primitives and justify advantages and disadvantages with the different primitives and choose an appropriate primitive for a specific application
- use the knowledge to build a small electronic or embedded system for increased safety and explain how the safety is guaranteed in the system.
Literature and preparations
Specific prerequisites
Knowledge in digital design, 6 credits, corresponding to completed course IE1204/IE1205.
Course from Upper Secondary School equivalent to the Swedish upper secondary course English B/6.
Recommended prerequisites
Equipment
Literature
Examination and completion
If the course is discontinued, students may request to be examined during the following two academic years.
Grading scale
Examination
- LABA - Laboratory work, 2.5 credits, grading scale: P, F
- PROA - Project, 1.0 credits, grading scale: P, F
- TENA - Written exam, 4.0 credits, grading scale: A, B, C, D, E, FX, F
Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.
The examiner may apply another examination format when re-examining individual students.
Opportunity to complete the requirements via supplementary examination
Opportunity to raise an approved grade via renewed examination
Examiner
Ethical approach
- All members of a group are responsible for the group's work.
- In any assessment, every student shall honestly disclose any help received and sources used.
- In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.
Further information
Course room in Canvas
Offered by
Main field of study
Education cycle
Add-on studies
Contact
Transitional regulations
Students who have taken but not completed the course are offered to complete those missing course components.
Supplementary information
In this course, the EECS code of honor applies, see: http://www.kth.se/en/eecs/utbildning/hederskodex.