The page uses Browser Access Keys to help with keyboard navigation. Click to learn moreSkip to Navigation

Different browsers use different keystrokes to activate accesskey shortcuts. Please reference the following list to use access keys on your system.

Alt and the accesskey, for Internet Explorer on Windows
Shift and Alt and the accesskey, for Firefox on Windows
Shift and Esc and the accesskey, for Windows or Mac
Ctrl and the accesskey, for the following browsers on a Mac: Internet Explorer 5.2, Safari 1.2, Firefox, Mozilla, Netscape 6+.

We use the following access keys on our gateway

n Skip to Navigation
k Accesskeys description
h Help
University of Tennessee, Knoxville    
  Feb 24, 2018
2015-2016 Undergraduate Catalog [ARCHIVED CATALOG]

[Add to Portfolio]

ECE 459 - Secure and Trustworthy Computer Hardware Design

3 Credit Hours
In-depth introduction to a range of new developments for the design of secure and trustworthy computer hardware. Topics covered include physical and invasive attack models, side-channel analysis (SCA) attacks, physical unclonable functions, hardware-based random number generators, watermarking of intellectual property (IP) blocks, FPGA security, passive and active metering for piracy prevention, and hardware Trojan detection and isolation.

(RE) Prerequisite(s): 351 or instructor approval.

[Add to Portfolio]