Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

ICAS - An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans

IEEE via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course aims to teach learners about estimating the susceptibility of integrated circuit (IC) layouts to additive trojans. The course covers topics such as the hardware development process, untrusted foundry defenses, IC construction, and preventive layout-level defenses. By the end of the course, students will be able to understand how hardware trojans are inserted, evaluate ICAS metrics, and analyze the attack surface with undirected defense. The teaching method involves a lecture format with a duration of 17 minutes. This course is intended for individuals interested in hardware security, IC layout design, and system security.

Syllabus

Intro
Hardware is the Foundation!
State of Systems Security
Hardware Development Process
Outsourcing Reduces Trust
Hardware Flaws
Untrusted Foundry Defenses
Integrated Circuit Construction
How are Hardware Trojans Inserted?
ICAS: Integrated Circuit Attack Surface
ICAS Metrics
Justification for Metrics
Evaluation
Preventive Layout-Level Defenses
Attack Surface with Undirected Defense
Conclusion
Questions?

Taught by

IEEE Symposium on Security and Privacy

Reviews

Start your review of ICAS - An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.