Course Objectives
- To introduce security and trust issues associated with hardware systems.
- To provide a background for recommending countermeasures for security and trust vulnerabilities.
- To impart experience in the design and implementation of security and trust primitives on both ASIC and FPGA.
- To impart knowledge aimed towards devising security and trust design and evaluation processes.
Course Outcomes: At the end of the course, the student should be able to
- CO1: To understand various threats in Hardware systems due to hardware Trojans.
- CO2: To apply various techniques to detect Hardware Trojans and securing designs.
- CO3: To analyze various design for security methods.
- CO4: To evaluate the requirements of reconfigurable hardware and security countermeasures.
Skills Acquired: Will acquire knowledge to design hardware with integrated security features, and ensure trustworthiness of VLSI circuits.
CO-PO Mapping:
CO/PO |
PO 1 |
PO 2 |
PO 3 |
PSO1 |
PSO2 |
PSO3 |
CO 1 |
|
|
3 |
2 |
2 |
|
CO 2 |
|
|
2 |
2 |
– |
|
CO 3 |
|
|
3 |
2 |
2 |
|
CO 4 |
|
|
2 |
– |
2 |
|