In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.
- 5 stars59.14%
- 4 stars23.52%
- 3 stars10.01%
- 2 stars4.61%
- 1 star2.70%
Nice, instructive course.
However, from time to time I felt I would need to have access to the copies of the slides, not currently available.
It was a very nice course. Lots of exposure was given to mathematical ways of analyzing threat.
Great course, very helpful. The content is well organised and you need to have all the require knowledge, otherwise you won't get it.
This is not a class for a non-computer scientist or a non-electrical engineer. It's frustrating to learn the material this way, but the information is valuable.