HEAD
CY-801Hardware Security
Course Outcome:
CO1: Understand and optimize the process of implementing cryptographic algorithms on hardware
CO2: Learn the different kinds of attacks that can be mounted against cryptographic algorithms
CO3: Learn the process of building Physical Unclonable Functions and make them resilient to attacks
CO4: Understand the different kinds of Trojans, their impact and learn the effective countermeasures for defending against them
CO5: Learn the different kinds of threats at the micro architectural level and their corresponding countermeasures.
Debdeep Mukhopadhyay and RajatSubhra Chakraborty, "Hardware Security: Design, Threats, and Safeguards", CRC Press.
Ahmad-Reza Sadeghi and David Naccache (eds.): Towards Hardware-intrinsic Security: Theory and Practice, Springer.
Ted Huffmire et al: Handbook of FPGA Design Security, Springer.
Stefan Mangard, Elisabeth Oswald, Thomas Popp: Power analysis attacks - revealing the secrets of smart cards. Springer 2007.
Doug Stinson, Cryptography Theory and Practice, CRC Press.
After completing the course student should be able to:
Identify security threats in database systems.
Ensure the data confidentiality anddata integrity.
Only authorized user has access to the data, avoid unauthorized data observation & modification.
Design and Implement secure database systems.
Solve Complex Problems in a Team of database works.
Functional dependencies: Keys in a relational model, Concept of functional dependencies, Normal forms based on primary keys, BCNF Further Dependencies: Multi-values dependencies and fourth normal form, Join dependencies and fifth normal form, Inclusion dependencies, other dependencies and normal forms.
Handbook of Database Security: Applications and Trends by Michael Gertz and SushilJajodia
Database Security and Auditing, Hassan A. Afyouni, India Edition, CENGAGE Learning, 2009.
Database Security, Castano, Second edition, Pearson Education
Database security by alfred basta, melissazgola, CENGAGE learning
H. F. KorthandA.Silberschatz.DatabaseConcept, TMH.
Godbole, “Information system security”, Wiley.
Cole.Krutz&Conley “Networksecurity”Wiley.
Describe in-depth about theories, models and algorithms in machine learning.
Compare and contrast different learning algorithms with parameters.
Examine the nature of a problem at hand and find the appropriate learning algorithms and it’s parameters that can solve it efficiently enough.
Design and implement of deep and reinforcement learning approaches for solving real-life problems.
Gradient Descent (GD), Momentum Based GD, Nesterov Accelerated GD, Stochastic GD, AdaGrad,
RMSProp, Adam, Eigenvalue Decomposition. Recurrent Neural Networks, Back propagation through
time (BPTT), Vanishing and Exploding Gradients, Truncated BPTT, GRU, LSTMs, Encoder Decoder
Models, Attention Mechanism, Attention over images.
Sparse auto encoders, Contractive auto encoders, Regularization: Bias Variance Tradeoff, L2 regularization, early stopping, Dataset augmentation, Parameter sharing and tying, Injecting noise at Input, Ensemble methods, Dropout, Batch Normalization, Instance Normalization, Group Normalization.
Learning Vectorial Representations of Words, Convolutional Neural Networks, LeNet, AlexNet, ZF-Net,
VGGNet, GoogLeNet, ResNet, Visualizing Convolutional Neural Networks, Guided Back propagation,
Deep Dream, Deep Art, Recent Trends in Deep Learning Architectures.
Deep Learning, An MIT Press book, Ian Goodfellow and YoshuaBengio and Aaron Courville
Pattern Classification- Richard O. Duda, Peter E. Hart, David G. Stork, John Wiley & Sons Inc.
Reinforcement Learning: An Introduction, Sutton and Barto, 2nd Edition.
Reinforcement Learning: State-of-the-Art, Marco Wiering and Martijn van Otterlo, Eds.
To understand the design strategies of lightweight ciphers to secure resource constrained devices.
To compare various lightweightcryptographic algorithms.
To acquire the fundamental knowledge onthe applications of lightweight cryptography.
SrinivasanRamakrishnan, “Lightweight Cryptographic Techniques and Cyber security Approaches”, ISBN: 978-1-80355-733-5, 2022.
Eisenbarth , “Lightweight Cryptography for Security and Privacy”, Springer ,2015.
Stalling W., “ Network Security Essentials”, Pearson
Practical Packet Analysis: Using Wireshark to Solve Real-Word Network problems by ChrisSanders
Jochen Schiller, “Mobile Communications”, PHI.
UweHansmann, LotharMerk, Martin S. Nicklons and Thomas Stober, Principles of MobileComputing, Springer, New York, 2003
Frank Adelstein, Sandeep KS Gupta, Golden Richard, Fundamentals of Mobile and PervasiveComputing,McGraw-Hill
Understand Tracing Illicit financialTransactions.
Understand the various anti-moneylaundering laws.
Explain the various schemes of insurancefraud.
State and explain Bankruptcy schemes.
Explain the methods of proving corruptpayments.
Expert Fraud Investigation; a step-by-stepguide by Tracy L. Coenen.
A Practitioner’s Guide to the Law andRegulation of Financial Crime by ArunSrivastava and Andrew Keltie, 2010.
Anti-Money Laundering ActForensic Criminology by Wayne A.Petherick, Brent E. Turvey, Claire E.Ferguson, 2009.
Insurance Fraud Casebook, Paying apremium for crime by Joseph T. Wells andLaura Hymes
To provide the basic knowledge on the levels of interaction, design models, techniques and validations focusing on the different aspects of human-computer interface and interactions.
Enumerate the basic concepts of human, computer interactions
Create the processes of human computer interaction life cycle
Analyze and design the various interaction design models
Apply the interface design standards/guidelines for evaluating the developed interactions
Apply product usability evaluations and testing methods
A Dix, Janet Finlay, G D Abowd, R Beale., Human-Computer Interaction, 3rd Edition,Pearson Publishers,2008.
Shneiderman, Plaisant, Cohen and Jacobs, Designing the User Interface: Strategies
forEffective Human Computer Interaction, 5th Edition, Pearson Publishers, 2010.
Hans-JorgBullinger,” Human-Computer Interaction”, Lawrence Erlbaum Associates,Publishers.
Jakob Nielsen,” Advances in Human-computer Interaction”,Ablex Publishing Corporation
Thomas S. Huang,” Real-Time Vision for Human-Computer Interaction”, Springer
Preece et al, Human-Computer Interaction, Addison-Wesley, 19.
CY-801Hardware Security
Course Outcome:
CO1: Understand and optimize the process of implementing cryptographic algorithms on hardware
CO2: Learn the different kinds of attacks that can be mounted against cryptographic algorithms
CO3: Learn the process of building Physical Unclonable Functions and make them resilient to attacks
CO4: Understand the different kinds of Trojans, their impact and learn the effective countermeasures for defending against them
CO5: Learn the different kinds of threats at the micro architectural level and their corresponding countermeasures.
Debdeep Mukhopadhyay and RajatSubhra Chakraborty, "Hardware Security: Design, Threats, and Safeguards", CRC Press.
Ahmad-Reza Sadeghi and David Naccache (eds.): Towards Hardware-intrinsic Security: Theory and Practice, Springer.
Ted Huffmire et al: Handbook of FPGA Design Security, Springer.
Stefan Mangard, Elisabeth Oswald, Thomas Popp: Power analysis attacks - revealing the secrets of smart cards. Springer 2007.
Doug Stinson, Cryptography Theory and Practice, CRC Press.
After completing the course student should be able to:
Identify security threats in database systems.
Ensure the data confidentiality anddata integrity.
Only authorized user has access to the data, avoid unauthorized data observation & modification.
Design and Implement secure database systems.
Solve Complex Problems in a Team of database works.
Functional dependencies: Keys in a relational model, Concept of functional dependencies, Normal forms based on primary keys, BCNF Further Dependencies: Multi-values dependencies and fourth normal form, Join dependencies and fifth normal form, Inclusion dependencies, other dependencies and normal forms.
Handbook of Database Security: Applications and Trends by Michael Gertz and SushilJajodia
Database Security and Auditing, Hassan A. Afyouni, India Edition, CENGAGE Learning, 2009.
Database Security, Castano, Second edition, Pearson Education
Database security by alfred basta, melissazgola, CENGAGE learning
H. F. KorthandA.Silberschatz.DatabaseConcept, TMH.
Godbole, “Information system security”, Wiley.
Cole.Krutz&Conley “Networksecurity”Wiley.
Describe in-depth about theories, models and algorithms in machine learning.
Compare and contrast different learning algorithms with parameters.
Examine the nature of a problem at hand and find the appropriate learning algorithms and it’s parameters that can solve it efficiently enough.
Design and implement of deep and reinforcement learning approaches for solving real-life problems.
Gradient Descent (GD), Momentum Based GD, Nesterov Accelerated GD, Stochastic GD, AdaGrad,
RMSProp, Adam, Eigenvalue Decomposition. Recurrent Neural Networks, Back propagation through
time (BPTT), Vanishing and Exploding Gradients, Truncated BPTT, GRU, LSTMs, Encoder Decoder
Models, Attention Mechanism, Attention over images.
Sparse auto encoders, Contractive auto encoders, Regularization: Bias Variance Tradeoff, L2 regularization, early stopping, Dataset augmentation, Parameter sharing and tying, Injecting noise at Input, Ensemble methods, Dropout, Batch Normalization, Instance Normalization, Group Normalization.
Learning Vectorial Representations of Words, Convolutional Neural Networks, LeNet, AlexNet, ZF-Net,
VGGNet, GoogLeNet, ResNet, Visualizing Convolutional Neural Networks, Guided Back propagation,
Deep Dream, Deep Art, Recent Trends in Deep Learning Architectures.
Deep Learning, An MIT Press book, Ian Goodfellow and YoshuaBengio and Aaron Courville
Pattern Classification- Richard O. Duda, Peter E. Hart, David G. Stork, John Wiley & Sons Inc.
Reinforcement Learning: An Introduction, Sutton and Barto, 2nd Edition.
Reinforcement Learning: State-of-the-Art, Marco Wiering and Martijn van Otterlo, Eds.
To understand the design strategies of lightweight ciphers to secure resource constrained devices.
To compare various lightweightcryptographic algorithms.
To acquire the fundamental knowledge onthe applications of lightweight cryptography.
SrinivasanRamakrishnan, “Lightweight Cryptographic Techniques and Cyber security Approaches”, ISBN: 978-1-80355-733-5, 2022.
Eisenbarth , “Lightweight Cryptography for Security and Privacy”, Springer ,2015.
Stalling W., “ Network Security Essentials”, Pearson
Practical Packet Analysis: Using Wireshark to Solve Real-Word Network problems by ChrisSanders
Jochen Schiller, “Mobile Communications”, PHI.
UweHansmann, LotharMerk, Martin S. Nicklons and Thomas Stober, Principles of MobileComputing, Springer, New York, 2003
Frank Adelstein, Sandeep KS Gupta, Golden Richard, Fundamentals of Mobile and PervasiveComputing,McGraw-Hill
Understand Tracing Illicit financialTransactions.
Understand the various anti-moneylaundering laws.
Explain the various schemes of insurancefraud.
State and explain Bankruptcy schemes.
Explain the methods of proving corruptpayments.
Expert Fraud Investigation; a step-by-stepguide by Tracy L. Coenen.
A Practitioner’s Guide to the Law andRegulation of Financial Crime by ArunSrivastava and Andrew Keltie, 2010.
Anti-Money Laundering ActForensic Criminology by Wayne A.Petherick, Brent E. Turvey, Claire E.Ferguson, 2009.
Insurance Fraud Casebook, Paying apremium for crime by Joseph T. Wells andLaura Hymes
To provide the basic knowledge on the levels of interaction, design models, techniques and validations focusing on the different aspects of human-computer interface and interactions.
Enumerate the basic concepts of human, computer interactions
Create the processes of human computer interaction life cycle
Analyze and design the various interaction design models
Apply the interface design standards/guidelines for evaluating the developed interactions
Apply product usability evaluations and testing methods
A Dix, Janet Finlay, G D Abowd, R Beale., Human-Computer Interaction, 3rd Edition,Pearson Publishers,2008.
Shneiderman, Plaisant, Cohen and Jacobs, Designing the User Interface: Strategies
forEffective Human Computer Interaction, 5th Edition, Pearson Publishers, 2010.
Hans-JorgBullinger,” Human-Computer Interaction”, Lawrence Erlbaum Associates,Publishers.
Jakob Nielsen,” Advances in Human-computer Interaction”,Ablex Publishing Corporation
Thomas S. Huang,” Real-Time Vision for Human-Computer Interaction”, Springer
Preece et al, Human-Computer Interaction, Addison-Wesley, 19.