alternative

Dr. Amit Singh

Dr. Amit Singh is in the faculty of the University of Essex, UK. His research interests include design and optimization of systems of various scales for security, sustainability, energy-efficiency and high-performance.

alternative

Dr. John Jose

Dr. John Jose is an Associate Professor of Indian Institute of Technology, Guwahati. His research interests include multicore computer architectures and secure system on chip design techniques.

alternative

Dr. Moumita Patra

Dr. Moumita Patra is an Associate Professor of Indian Institute of Technology, Guwahati. Her research interests include vehicular communication and wireless network security.

  • Course Overview

  • Globally, there is particular interest in secure computing and sustainable computing, and it also aligns well with UN’s digital security and sustainability goals. Information and communication technology devices are responsible for about 10% of global carbon emissions. One of the reasons being abundant amount of computing/electronic systems around us and their exponential increase to support Artificial Intelligence (AI) applications with the aim to enhance lives, efficiency, privacy and latency. Further, attacks on these devices are intensifying, causing loss in billions to organizations. This course will dive into different approaches to be taken in designing computing/electronic systems towards enhancing security and sustainability, which will also enhance profit, trust and life while also fulfilling the related government regulations in the future.


    The course will start with familiarizing the importance and fundamentals of secure and sustainable computing for systems of various scales, providing familiarization with practical problems faced by organisations and potential solutions, provide current system design trends on digital security and sustainability and cover relate related tools and techniques. This is expected to enhance the capability of the participants to identify problems related to digital security and sustainability and apply suitable measures in electronic devices. The candidates will also be provided with the directions for the future research and development based on emerging trends.

    Course participants will learn these topics through lectures and tutorials. Also case studies will be shared to stimulate research motivation of participants.

  • You Should Attend, If, you are
    • You are interested in the security of computing systems.
    • You are interested in sustainable computing.
    • You are interested in designing or optimizing systems for security and/or sustainability.
    • You are a student, faculty, researcher, scientist or engineer interested in learning on the digital security and/or sustainability technologies for computing/electronic systems of various scales.

    Course Layout

    Day

    Lecture

    Lecture Name

    Day 1
    25 August 2025

    Lecture 1

    Introduction to Secure Computing and Introduction to Sustainable Computing

    Day 1
    25 August 2025

    Lecture 2

    System Design Considerations and System Operation Considerations

    Day 1
    25 August 2025

    Lecture 3

    Computing Systems of Various Scales, Design Challenges

    Day 2
    26 August 2025

    Lecture 4

    System Design Methodologies for Digital Security (1)

    Day 2
    26 August 2025

    Lecture 5

    System Design Methodologies for Digital Security (2)

    Day 2
    26 August 2025

    Lecture 6

    Analysing Design Methodology Choices, Security Considerations, Best Security Identification

    Day 2
    26 August 2025

    Lecture 7

    System Design Methodologies for Sustainability

    Day 3
    27 August 2025

    Lecture 8

    Analysing Sustainability Methodology Choices, Sustainability Considerations, Best Sustainability Practices

    Day 3
    27 August 2025

    Lecture 9

    Digital Security vs. Sustainability, Joint Digital Security and Sustainability Considerations

    Day 3
    27 August 2025

    Lecture 10

    Emerging System Design Paradigms, Future Trends

    Day 4
    28 August 2025

    Lecture 11

    Security of Embedded Edge Devices

    Day 4
    28 August 2025

    Lecture 12

    Communication Security, Detection, and possible Mitigation Strategies

    Day 5
    29 August 2025

    Exam

    2 hrs [10am-12pm]

    Registration Procedure

    1. Candidate should apply to the course using the Application form link:
    2. After shortlisting the candidate will be notified via email.
    3. Shortlisted candidate should pay the registration fee and provide the details in the below form





    Course fees:
    1. Participants from abroad : US $500
    2. Industry/ Research Organizations: Rs. 20000/-(Including GST)
    3. Academic Institutions: Rs. 10,000/- (Including GST)
    4. Indian students: Rs. 1,000/- (Including GST)

    The aforementioned fees include all instructional materials, computer use for tutorials, 24-hr free internet facility during the course. The participants will be provided with accommodation for additional payment.

    The selected candidates must pay the applicable fees by online bank transfer / wire transfer / internet banking to the following bank account. Please keep the online transfer receipt for proof of transfer.
    Paymemt Details

    Bank Name : STATE BANK OF INDIA
    Branch Name : IIT GUWAHATI BRANCH
    IFSC Code : SBIN0014262
    MICR code : 781002053
    Account Name : IIT GUWAHATI R&D – MHRD
    Account No : 31151533220
    Account Type : Savings
     

    Dr. John Jose

    Course Coordinator
    Department of Computer Science and Engineering,
    IIT Guwahati
    Guwahati -781039
    Phone: 0361-2583256 (O)
    E-mail:johnjose @ iitg.ac.in

    Dr. Moumita Patra

    Course Coordinator
    Department of Computer Science and Engineering,
    IIT Guwahati
    Guwahati -781039
    Phone: +91 - 361 2582365 (O)
    E-mail:moumita.patra @ iitg.ac.in