Week 1 - Introduction

2026-01-10  |  Lecture , Introduction

Download the lecture slides for this week here: COMP6420_2026T1_Week1_Intro.pdf

1. Course Logistics & Administration

See the details at the syllabus.

A note on the Tools, Languages, and Hardware in Labs

In labs you will mostly use:

You will work on a custom Hackster board, which has an FPGA and a microcontroller, each with its own USB connection. The 2026 revision of the board is on the way; initially you may be using last year’s hardware.

Lab submissions are a mix of code and documentation. Labs are typically released in a given week and due at 5 pm on the Friday of the following week.


2. Motivation: Why Hardware Security?

Most security courses focus on software: finding exploitable bugs, preserving privacy, enforcing access control, and keeping systems available. Techniques include static analysis, penetration testing, secure development practices, and careful use of third-party libraries.

All of that rests on a largely unspoken assumption: the hardware is trustworthy. We assume that:

This course questions that assumption. It looks at what happens when the underlying hardware, or the supply chain that produces it, cannot be fully trusted.

3. Globalisation and the Hardware Supply Chain

From Vertical Integration to Global Supply Chains

Historically, many companies did everything in-house: design, fabrication, testing, packaging, and assembly. Today, these steps are often spread across different companies and countries. This global, horizontally-distributed model is driven by cost and scale.

A separate but related trend is the rise of fabless semiconductor companies (e.g., NVIDIA, AMD, Apple, ARM, Qualcomm, Broadcom). These companies design chips but outsource fabrication to large foundries. As a result, a single chip might involve:

Each hand-off is a potential security risk.

The IC Design Flow and Third-Party Exposure

The integrated circuit (IC) design flow runs from system-level specification through register-transfer level (RTL), logic synthesis, place-and-route, mask generation, fabrication, packaging, and test. Third parties may contribute IP cores, design tools, or the entire fabrication process.

Hardware security concerns include:

PCBs and System Integration

Beyond the chip, the printed circuit board (PCB) and system integration introduce even more actors: PCB designers, board manufacturers, assembly houses, firmware developers, and system integrators. Each stage can introduce:

The central question emerges: how do we build trusted systems on untrusted manufacturing and supply chains?


4. Course Content and Goals

For this course, “hardware” primarily means:

The course aims to:


5. Hardware Security Risks and Threat Categories

The CIA Triad Applied to Hardware

Hardware security is framed around the familiar Confidentiality, Integrity, and Availability (CIA) triad:

Hardware Trojans

A hardware Trojan is a deliberate, malicious modification in a hardware design or implementation. It can aim to:

Potential insertion points include third-party IP providers, compromised foundries, and integration/assembly stages. Well-known cases and allegations, such as the Clipper chip backdoor or reported military and telecom incidents, show how damaging such modifications can be.

Supply-Chain Attacks, IP Theft, and Overbuilding

The lecture also introduces several other threat types:

Counterfeit Components

Counterfeit parts are components that are relabelled, reused, or produced outside the authorised supply chain. They may be:

In mission-critical systems (aircraft, military platforms, core networking infrastructure) these can lead to serious failures, because they may behave unpredictably under stress, temperature, or over time. The lecture includes examples of counterfeit parts discovered in aircraft and communication systems, and large seizures of fake networking equipment.


6. Real-World Hardware Security Case Studies

The lecture uses a series of case studies to illustrate how hardware security issues arise in the real world. A few notable ones:

Together, these (and other) examples show that hardware security problems appear in contexts ranging from consumer gadgets to national elections and telecommunications.


7. A Moving Target

Hardware security is not static. New technologies create new attack surfaces (e.g., IoT, BCIs, complex SoCs), and attackers continue to exploit implementation details and supply-chain weaknesses. Defensive techniques are also evolving, including more secure design flows, stronger physical hardening, and better supply-chain oversight.

You should expect that some of what they learn will continue to change; the value lies in understanding the principles and the attacker mindset.