Securing Hardware and Devices
HGI » UbiCrypt » Projects

Se­cu­ring Hard­ware and De­vices

1st ad­vi­sor: Gü­ney­su, 2nd ad­vi­sor: May

Due to low-le­vel in­te­gra­ti­on, se­cu­ri­ty so­lu­ti­ons in hard­ware ty­pi­cal­ly pro­vi­de si­gni­fi­cant­ly hig­her pro­tec­tion against a wide range of at­ta­ckers than pure soft­ware im­ple­men­ta­ti­ons. This makes se­cu­ri­ty so­lu­ti­ons in hard­ware for many (trusted) pro­ducts, such as smart cards or se­cu­ri­ty to­kens, the pre­fer­red choice. Howe­ver, at­tacks, such as me­a­su­re­ment of si­de-chan­nel in­for­ma­ti­on, phy­si­cal tam­pe­ring, and extrac­tion or re­ver­se-en­gi­nee­ring of in­ter­nal con­fi­gu­ra­ti­ons need to be faced and coun­te­red for such hard­ware se­cu­ri­ty im­ple­men­ta­ti­ons as well.

 

We offer the fol­lowing dis­ser­ta­ti­on topic(s), ad­dres­sing se­ver­al of these major is­su­es in hard­ware se­cu­ri­ty. All to­pics in­vol­ve a close col­la­bo­ra­ti­on with other ma­the­ma­ti­cal and (soft­ware) en­gi­nee­ring re­se­arch groups.

  • Hard­ware-ent­an­g­led cryp­to­gra­phy to com­bi­ne gate-le­vel hard­ware cha­rac­te­ris­tics with cryp­to­gra­phic pri­mi­ti­ves, e.g., to sub­sti­tu­te or ge­ne­ra­te a secret key
  • For­mal me­thods to ho­lis­ti­cal­ly eva­lua­te and de­sign se­cu­ri­ty pro­ces­sors in hard­ware
  • De­sign tools to har­den hard­ware im­ple­men­ta­ti­ons, e.g., im­ple­men­ting hard­ware ob­fu­s­ca­ti­on, au­to­ma­ted si­de-chan­nel ana­ly­sis and coun­ter­me­a­su­re in­te­gra­ti­on, cryp­to­gra­phic hard­ware evo­lu­ti­on in re­con­fi­gura­ble de­vices
  • Extrac­tion and eva­lua­ti­on of novel en­tro­py sour­ces in hard­ware, for ran­dom num­ber and chip iden­ti­ty ge­ne­ra­ti­on

 

Prof. Tim Güneysu

Prof. Tim Güneysu