Skip to content
CEC Semenster Undefined

Protect your Hardware from Hacking and Theft

Warren Miller -
November 10,
2014
Stealing and Hacking Your Design is Easier than You Think
This class will review key concepts from the December 2013 class and lay the groundwork for describing the implementation details you need to be able to select, program and design with devices you can use to protect your valuable IP. Protection from reverse engineering, copying, cloning, hacking and tampering will be the focus of the course.
Course Resources
Special Educational Materials
Listen/Download Archive (mp3)
November 11,
2014
How do you Implement Secure Hardware?
This class will cover the key techniques used by modern devices to protect design IP from the most common threats. Starting with simple approaches to tamper protection, and then moving on to protection from copying and cloning, this class will begin to introduce key devices and features needed to successfully protect your design.
Course Resources
Special Educational Materials
Listen/Download Archive (mp3)
November 12,
2014
An Overview
This class will review several of the current devices that include security capabilities that can be used to protect your design from hacking and theft. Some MCUs, FPGAs and CPUs now include key security features that can be used to protect your design. Additionally, specialized peripherals, memories and accelerators are also available for adding protection. Examples of all of these devices will be described.
Course Resources
Special Educational Materials
Listen/Download Archive (mp3)
November 13,
2014
Protecting Your System in the Field
Once your hardware is deployed it's a target, either directly by "invasive"¬ù probing of the actual board or via network based attacks. Protecting your hardware from these threats requires additional levels of protection and more complex algorithms and techniques. Luckily manufacturers provide simplifying features and capabilities that can be used to protect field deployed systems.
Course Resources
Special Educational Materials
Listen/Download Archive (mp3)
November 14,
2014
An Example Implementation in Detail
This class will pull together information from all the previous classes and illustrate the described techniques using a detailed example design. Several techniques outlined in the previous classes will be used to protect the example design from tampering, reverse engineering, copying and from network-based attacks on security keys and boot blocks, which are two of the most common and most aggressive forms of remote attacks.
Course Resources
Special Educational Materials
Listen/Download Archive (mp3)
Instructor
Warren Miller