Syllabus

2026-01-10

Class dates: 2026T1, Tuesdays

Convenor: Dr. Hammond Pearce

Introduction

The functionality and capability of computer systems are defined by their real-world hardware. Likewise, the cyber security of computer systems depends upon the security of their underlying hardware. This course is designed to explore both hardware security and trust in hardware, providing a comprehensive understanding of the underpinning principles and practices which apply to both the security and trust of computer systems, from printed circuit boards to individual integrated circuits. Students will explore theoretical aspects of what makes hardware secure, performing threat modelling and understanding the state of the art in hardware security, as well as get hands-on experience with practical attacks and defences for both virtual and real-world hardware. The course will equip students with the skills necessary to analyse, design, and implement hardware security measures.

Aims

The primary goal of this course is to familiarize students with the concepts core to the domain of hardware security, ranging from fundamental principles to state-of-the-art research in the area. Students will be encouraged to learn the how the implementations of popular systems and algorithms introduce consequences to the overall design. The emphasis is for students to be able to understand the domain well enough that they can consider both practical and critical considerations of unfamiliar systems to identify weaknesses and propose countermeasures. Upon completing the course, students will have a comprehensive understanding of the history of hardware security, the current techniques used, and the future challenges that must be addressed in this field.

Grading

There is an attendance requirement for this course. You must attend >=50% of lectures to pass the course overall.

Draft schedule:

Week 1:

Week 2:

Week 3:

Week 4:

Week 5:

Week 6:

Week 7:

Week 8:

Week 9:

Week 10:

Week 11: