Home > PUF Academy > Hardware Security and Practices Tutorial (2019)

In the course of ” Introduction to Hardware Security “, we will discuss the role of system security function and the operation practice through market application overview and system service cases such as cryptocurrency, mobile payment, secure supply chain. Also, everyone should be aware of the importance of anti-hacking protection.

The course is mainly divided into 3 parts:

  1. Market Applications
  2. Security SoC Operation
  3. Hardware Root of Trust

The first of all is to give you a whole picture of software and hardware security and their application markets. The second part will dive into the key software and hardware designs in the system and the considerations of security function deployment. In the third part, we will discuss about the importance of “root of trust” from the foundation of product design. You will learn the theory of physical unclonable function (PUF) and the related technology and application.

Lecturer: Dr. Evans Yang, PUFsecurity EVP

Language: Chinese

Cooperation Unit: Tsinghua University (Taiwan)

The course video can be watched directly on this page. If you would like to have handouts as well, please find out the password at the bottom of the page.



  1. 市場安全應用
  2. 安全系統晶片運作
  3. 硬體信任根




Part I. Market Applications

Chapter 1 : Introduction to Hardware Security

1. Application Market
2. Software vs. Hardware Security
3. PUF Introduction


Part II. Security SoC Operation

Chapter 2 : Introduction to Security SoC

2-1 Designing Chip with Security (I)

1. Market Application and Security Demand
2. How Chip Security Works

2-2 Designing Chip with Security (II)

1. Basic of Cryptography
2. Security SoC Cases

2-3 Security Operation in SoC

1. Secure Authentication, Secure Communication
2. Security SoC Use Case

Chapter 3 : Introduction to Cryptography & SCA Experiment

3-1 Implementation of Crypto Chips and Attack Models

1. Hardware Security: Internet of Vehicle

2. Cryptanalysis and Power Analysis Attacks

Practice: Wifi Cracking

3-2 AES Implementation and Power Analysis
1. Algorithm Specification
2. Mode of Operations
3. Implementation Architecture
4. Power Analysis Attacks

Practice: Side Channel Attack – Simple Power Analysis

3-3 ECC Implementation and Power Analysis
1. Introduction
2. Elliptic Curve Scalar Multiplication (ECSM)
3. Implementation Architecture
4. Power Analysis Attacks

Practice: Side Channel Attack – Differential Power Analysis

Chapter 4 : Introduction to Malicious Attack

4-1 What Is Side Channel Attack and How To Prevent?

4-2 What Is Physical Attack (Tampering) and How To Prevent?


Part III. Hardware Root of Trust

Chapter 5 : Introduction to Root of Trust

5-1 Root of Trust by Software and Hardware

5-2 Why Inborn Root of Trust?

Chapter 6 : Physical Unclonable Function (PUF)

6-1 What is PUF?

6-2 Different kinds of On Chip PUFs

6-3 Applications of PUF

Dear Mr. / Ms.

If you want to get the free tutorial course in PDF, you will need to enter a password : PUFsecurity@Academy

You can also find out the full series of this course on our Youtube Channel PUFsecurity Corp.