Abstract
The Internet of Things (IoT) sees the appearance of ever more connected objects. In such a context, the security aspect of these objects is more relevant than ever. That is why we have developed several courses about hardware security. Traditional security courses often start with a catalog of definitions that can sometimes be boring for students and therefore counterproductive. This study describes an escape game used as a sequence to introduce several security concepts. This serious game could be adapted according to the degree level of the students. Results show a significant improvement in acquiring skills for the students who plays to the escape game. All the contents of this course are open sourced and could be freely available on request.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Cellular networks for massive IoT. Technical report, Ericsson (2016)
Dagon, D., Martin, T., Starner, T.: Mobile phones as computing devices: the viruses are coming! IEEE Pervasive Comput. 3(4), 11–15 (2004)
Wolf, M., Weimerskirch, A., Wollinger, T.: State of the art: embedding security in vehicles. EURASIP J. Embed. Syst. 2007(1), 074706 (2007)
Halperin, D., Heydt-Benjamin, T.S., Ransford, B., Clark, S.S., Defend, B., Morgan, W., Fu, K., Kohno, T., Maisel, W.H.: Pacemakers and implantable cardiac debrillators: software radio attacks and zero-power defenses. In: IEEE Symposium on Security and Privacy, pp. 129–142, 2008. SP 2008. IEEE (2008)
Morris, R., Thompson, K.: Password security: a case history. Commun. ACM 22(11), 594–597 (1979)
Bourrée, M., Bruguier, F., Barthe, L., Benoit, P., Maurine, P., Torres, L.: SECNUM: an open characterizing platform for integrated circuits. In: European Workshop on Microelectronics Education (2012)
Turner, J., Paris, S.G.: How literacy tasks influence children’s motivation for literacy. Reading Teacher 48(8), 662–673 (1995)
Bossuet, L.: Teaching FPGA security. In: 2013 International Conference on Field-Programmable Technology (FPT), pp. 306–309. IEEE (2013)
Halak, B.: Course on secure hardware design of silicon chips. IET Circuits Devices Syst. 11(4), 304–309 (2017)
Bruguier, F., Benoit, P., Torres, L., Bossuet, L.: Hardware security: from concept to application. In: 2016 11th European Workshop on Microelectronics Education (EWME), May 2016, pp. 1–6 (2016)
Mackworth, N.H.: The breakdown of vigilance during prolonged visual search. Q. J. Exp. Psychol. 1(1), 6–21 (1948)
Annetta, L.A.: The \i’s” have it: a framework for serious educational game design. Rev. Gen. Psychol 14(2), 105 (2010)
Deterding, S., Dixon, D., Khaled, R., Nacke, L.: From game design elements to gamefulness: dening gamication. In: Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments, pp. 9–15. ACM (2011)
Deterding, S., Sicart, M., Nacke, L., O’Hara, K., Dixon, D.: Gamication. Using game-design elements in non-gaming contexts. In: CHI 2011 Extended Abstracts on Human Factors in Computing Systems, pp. 2425–2428. ACM (2011)
Csikszentmihalyi, M.: Flow and the Psychology of Discovery and Invention, vol. 39. Harper-Perennial, New York (1997)
Kolb, D.A.: Experiential Learning: Experience as the Source of Learning and Development. FT press, New Jersey (2014)
Lévy, P., Bononno, R.: Collective intelligence: Mankind’s emerging world in cyberspace. Perseus books, New York (1997)
Granger, S.: Social Engineering Fundamentals, Part i: Hacker Tactics. Security Focus, 18 December 2001
Daemen, J., Rijmen, V.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer Science & Business Media, Heidelberg (2013)
Goyal, K., Kinger, S.: Modified caesar cipher for better security enhancement. Int. J. Comput. Appl. 73(3), 26 (2013)
Kelly, T.: The Spartan Scytale. The Craft of the Ancient Historian: Essays’ in Honor of Chester G. Starr, pp. 141–169 (1985)
Engebretson, P.: The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy. Elsevier (2013)
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Annual International Cryptology Conference, Springer, pp. 388–397 (1999)
Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: International workshop on cryptographic hardware and embedded systems. Springer, pp. 16–29 (2004)
Bloom, B.: Bloom’s Taxonomy of Educational Objectives. Longman (1965)
Mais où est donc passée la septième compagnie? (1973)
Acknowledgment
The authors acknowledge the support of the French Agence Nationale de la Recherche (ANR), under grant ANR-11-IDFI-0017 (project IDEFI-FINMINA). They also acknowledge the Occitanie and the FEDER for they support to this project as well as the University of Montpellier and the I-site MUSE.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Bruguier, F., Lecointre, E., Pradarelli, B., Dalmasso, L., Benoit, P., Torres, L. (2021). Teaching Hardware Security: Earnings of an Introduction Proposed as an Escape Game. In: Auer, M., May, D. (eds) Cross Reality and Data Science in Engineering. REV 2020. Advances in Intelligent Systems and Computing, vol 1231. Springer, Cham. https://doi.org/10.1007/978-3-030-52575-0_60
Download citation
DOI: https://doi.org/10.1007/978-3-030-52575-0_60
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52574-3
Online ISBN: 978-3-030-52575-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)