Bachelorarbeiten
Performant Trace Recording with Streaming Mode
Beschreibung
Oscilloscope Trace Recording requires quick data processing, low-level driver API handling, high level post-processing, all highly configurable for scientific applications. To increase performance on the oscilloscope side, it is important to use the streaming mode, that is near real-time recording from the scope. This creates tight constraints for data processing on the computer side, as Samples will arrive with 1.2 GBit/s
In this thesis, you will continue development of a skeleton application for this task, written in Rust
Voraussetzungen
The following list of prerequisites is neither complete nor binding, but shall give you an idea, what the topic is about.
- Sufficient knowledge in a System-Level Programming language such as C/C++/Rust etc. as a baseline for programming abilities
- Basic to intermediate knowledge of Rust, to be able to actually enhance the status quo in Rust. Learning on the job is possible, probably.
- In the optimum case experience with (Side-Channel) Trace Measurement, to understand the environment of the program
Kontakt
If you are interested in this topic, don't hesitate to ask for an appointment via
Please include a grade report and a CV, so I can evaluate different focus areas to fit your experience.
Betreuer:
Needles in Haystacks
Beschreibung
In a world of multinational production chains, hardware trojans inserted by untrusted third parties are an emerging threat for the security of integrated circuits.
Detection methods have come a long way, but still cannot archieve good performance in realistic scenarios.
During this thesis, you will implement and improve an existing hardware trojan detection method.
Voraussetzungen
The following list of prerequisites is neither complete nor binding, but shall give you an idea, what the topic is about.
- Sufficient knowledge in a High-Level Programming language such as python, because machine learning and reverse engineering tools build on this
- Basic to intermediate knowledge of a hardware description language such as vhdl or verilog for understanding the trojan samples
- Basic knowledge in design/architecture of hardware design to understand trojan location and insertion.
Kontakt
If you are interested in this topic, don't hesitate to ask for an appointment via
Please include a grade report and a CV, so I can evaluate different focus areas to fit your experience.
Betreuer:
Exploring netlist representations for netlist RE
Beschreibung
Reverse engineering of silicon hardware designs is an interesting task for various applications in science and industry, such as patent infringement detection, security analysis or hardware trojan detection.
One of the most challenging tasks is to go from the flat netlist, that is a graph of logic gates and wires between them, to a high level description of the design.
In this work, you will analyze and compare different methods for representing a netlist and the benefits and problems when analyzing the netlist using the different representations
Voraussetzungen
The following list of prerequisites is neither complete nor binding, but shall give you an idea, what the topic is about.
- Sufficient knowledge in a python to use our existing framework
- Basic knowledge of a hardware description language such as vhdl or verilog to understand what you are analyzing
- Basic knowledge in graph theory, algorithms etc. to cope with problems on the way.
Kontakt
If you are interested in this topic, don't hesitate to ask for an appointment via
Please include a grade report and a CV, so I can evaluate different focus areas to fit your experience.
Betreuer:
Entwicklung von Werkzeugen für das Reverse Engineering
Beschreibung
Während dem Reverse Engineering von digitalen Schaltungen trifft man oft auf Probleme, deren Komplexität durch Automatisierung besser beherrscht werden kann. Viele Tools müssen dabei an die spezifische Forschung angepasst werden und helfen dann dabei, mit Standard-IC-Design-Werkzeugen weiterzuarbeiten.
Beispielsweise erhält man eine Netzliste, die mit einer unbekannten Zellbibliothek synthetisiert wurden. Nun ist es notwendig, die verwendete Zellbibliothek zu reverse-engineeren, z.B. mithilfe der Pin und Zell-Namen und daraus eine einfache Bibliothek herzustellen, mit der die Netzliste dann mit den Standard-Tools verarbeitet werden kann.
In dieser Ingenieurspraxis arbeiten Sie eng mit einem Wissenschaftler im Reverse Engineering-Bereich zusammen und erstellen ein oder mehrere hochwertige Werkzeuge für das Reverse Engineering von Netzlisten.
Kontakt
If you are interested in this topic, don't hesitate to ask for an appointment via
Please include a grade report and a CV, so I can evaluate different focus areas to fit your experience.
Betreuer:
Implementation of Hardware Trojans
Beschreibung
In a world of multinational production chains, hardware trojans inserted by untrusted third parties are an emerging threat for the security of integrated circuits.
In order to develop methods for hardware trojan detection, specimens of hardware trojans are needed. Unfortunately, the variety of specimen currently available is very low.
During this thesis, you will implement a hardware trojan for a FPGA or ASIC circuit.
Voraussetzungen
The following list of prerequisites is neither complete nor binding, but shall give you an idea, what the topic is about.
- Sufficient knowledge in a High-Level Programming language such as python for designing an interface
- Basic to intermediate knowledge of a hardware description language such as vhdl or verilog for designing the trojan
- Basic knowledge in design/architecture of cryptographic algorithms / CPUs to know where a trojan might be injected
Kontakt
If you are interested in this topic, don't hesitate to ask for an appointment via
Please include a grade report and a CV, so I can evaluate different focus areas to fit your experience.
Betreuer:
Masterarbeiten
Hide and Seek
Beschreibung
Side-Channel based exfiltration of cryptographic secrets is an long-standing and ever occuring problem when implementing cryptographic algorithms under the assumption of real hardware.
Established formally-proved countermeasures against side channels do not provide definite protection. In the real world, a multitude of hardening measures are necessary to provide in depth-protection.
In this thesis, you will try and compare different methods of in-depth protection.
Voraussetzungen
The following list of prerequisites is neither complete nor binding, but shall give you an idea, what the topic is about.
- Sufficient knowledge in a High-Level Programming language such as python for measurement automisation etc.
- Basic to intermediate knowledge of a hardware description language such as vhdl or verilog for designing the hardening measures
- In the optimum case experience with FPGAs to try the measures in the real world.
- Knowledge in design/architecture of cryptographic algorithms to know when and how to do the hardening.
Kontakt
If you are interested in this topic, don't hesitate to ask for an appointment via
Please include a grade report and a CV, so I can evaluate different focus areas to fit your experience.
Betreuer:
Needles in Haystacks
Beschreibung
In a world of multinational production chains, hardware trojans inserted by untrusted third parties are an emerging threat for the security of integrated circuits.
Detection methods have come a long way, but still cannot archieve good performance in realistic scenarios.
During this thesis, you will implement and improve an existing hardware trojan detection method.
Voraussetzungen
The following list of prerequisites is neither complete nor binding, but shall give you an idea, what the topic is about.
- Sufficient knowledge in a High-Level Programming language such as python, because machine learning and reverse engineering tools build on this
- Basic to intermediate knowledge of a hardware description language such as vhdl or verilog for understanding the trojan samples
- Basic knowledge in design/architecture of hardware design to understand trojan location and insertion.
Kontakt
If you are interested in this topic, don't hesitate to ask for an appointment via
Please include a grade report and a CV, so I can evaluate different focus areas to fit your experience.
Betreuer:
Exploring netlist representations for netlist RE
Beschreibung
Reverse engineering of silicon hardware designs is an interesting task for various applications in science and industry, such as patent infringement detection, security analysis or hardware trojan detection.
One of the most challenging tasks is to go from the flat netlist, that is a graph of logic gates and wires between them, to a high level description of the design.
In this work, you will analyze and compare different methods for representing a netlist and the benefits and problems when analyzing the netlist using the different representations
Voraussetzungen
The following list of prerequisites is neither complete nor binding, but shall give you an idea, what the topic is about.
- Sufficient knowledge in a python to use our existing framework
- Basic knowledge of a hardware description language such as vhdl or verilog to understand what you are analyzing
- Basic knowledge in graph theory, algorithms etc. to cope with problems on the way.
Kontakt
If you are interested in this topic, don't hesitate to ask for an appointment via
Please include a grade report and a CV, so I can evaluate different focus areas to fit your experience.
Betreuer:
Implementation of Hardware Trojans
Beschreibung
In a world of multinational production chains, hardware trojans inserted by untrusted third parties are an emerging threat for the security of integrated circuits.
In order to develop methods for hardware trojan detection, specimens of hardware trojans are needed. Unfortunately, the variety of specimen currently available is very low.
During this thesis, you will implement a hardware trojan for a FPGA or ASIC circuit.
Voraussetzungen
The following list of prerequisites is neither complete nor binding, but shall give you an idea, what the topic is about.
- Sufficient knowledge in a High-Level Programming language such as python for designing an interface
- Basic to intermediate knowledge of a hardware description language such as vhdl or verilog for designing the trojan
- Basic knowledge in design/architecture of cryptographic algorithms / CPUs to know where a trojan might be injected
Kontakt
If you are interested in this topic, don't hesitate to ask for an appointment via
Please include a grade report and a CV, so I can evaluate different focus areas to fit your experience.
Betreuer:
Interdisziplinäre Projekte
Performant Trace Recording with Streaming Mode
Beschreibung
Oscilloscope Trace Recording requires quick data processing, low-level driver API handling, high level post-processing, all highly configurable for scientific applications. To increase performance on the oscilloscope side, it is important to use the streaming mode, that is near real-time recording from the scope. This creates tight constraints for data processing on the computer side, as Samples will arrive with 1.2 GBit/s
In this thesis, you will continue development of a skeleton application for this task, written in Rust
Voraussetzungen
The following list of prerequisites is neither complete nor binding, but shall give you an idea, what the topic is about.
- Sufficient knowledge in a System-Level Programming language such as C/C++/Rust etc. as a baseline for programming abilities
- Basic to intermediate knowledge of Rust, to be able to actually enhance the status quo in Rust. Learning on the job is possible, probably.
- In the optimum case experience with (Side-Channel) Trace Measurement, to understand the environment of the program
Kontakt
If you are interested in this topic, don't hesitate to ask for an appointment via
Please include a grade report and a CV, so I can evaluate different focus areas to fit your experience.
Betreuer:
Entwicklung von Werkzeugen für das Reverse Engineering
Beschreibung
Während dem Reverse Engineering von digitalen Schaltungen trifft man oft auf Probleme, deren Komplexität durch Automatisierung besser beherrscht werden kann. Viele Tools müssen dabei an die spezifische Forschung angepasst werden und helfen dann dabei, mit Standard-IC-Design-Werkzeugen weiterzuarbeiten.
Beispielsweise erhält man eine Netzliste, die mit einer unbekannten Zellbibliothek synthetisiert wurden. Nun ist es notwendig, die verwendete Zellbibliothek zu reverse-engineeren, z.B. mithilfe der Pin und Zell-Namen und daraus eine einfache Bibliothek herzustellen, mit der die Netzliste dann mit den Standard-Tools verarbeitet werden kann.
In dieser Ingenieurspraxis arbeiten Sie eng mit einem Wissenschaftler im Reverse Engineering-Bereich zusammen und erstellen ein oder mehrere hochwertige Werkzeuge für das Reverse Engineering von Netzlisten.
Kontakt
If you are interested in this topic, don't hesitate to ask for an appointment via
Please include a grade report and a CV, so I can evaluate different focus areas to fit your experience.
Betreuer:
Forschungspraxis (Research Internships)
Performant Trace Recording with Streaming Mode
Beschreibung
Oscilloscope Trace Recording requires quick data processing, low-level driver API handling, high level post-processing, all highly configurable for scientific applications. To increase performance on the oscilloscope side, it is important to use the streaming mode, that is near real-time recording from the scope. This creates tight constraints for data processing on the computer side, as Samples will arrive with 1.2 GBit/s
In this thesis, you will continue development of a skeleton application for this task, written in Rust
Voraussetzungen
The following list of prerequisites is neither complete nor binding, but shall give you an idea, what the topic is about.
- Sufficient knowledge in a System-Level Programming language such as C/C++/Rust etc. as a baseline for programming abilities
- Basic to intermediate knowledge of Rust, to be able to actually enhance the status quo in Rust. Learning on the job is possible, probably.
- In the optimum case experience with (Side-Channel) Trace Measurement, to understand the environment of the program
Kontakt
If you are interested in this topic, don't hesitate to ask for an appointment via
Please include a grade report and a CV, so I can evaluate different focus areas to fit your experience.
Betreuer:
Hide and Seek
Beschreibung
Side-Channel based exfiltration of cryptographic secrets is an long-standing and ever occuring problem when implementing cryptographic algorithms under the assumption of real hardware.
Established formally-proved countermeasures against side channels do not provide definite protection. In the real world, a multitude of hardening measures are necessary to provide in depth-protection.
In this thesis, you will try and compare different methods of in-depth protection.
Voraussetzungen
The following list of prerequisites is neither complete nor binding, but shall give you an idea, what the topic is about.
- Sufficient knowledge in a High-Level Programming language such as python for measurement automisation etc.
- Basic to intermediate knowledge of a hardware description language such as vhdl or verilog for designing the hardening measures
- In the optimum case experience with FPGAs to try the measures in the real world.
- Knowledge in design/architecture of cryptographic algorithms to know when and how to do the hardening.
Kontakt
If you are interested in this topic, don't hesitate to ask for an appointment via
Please include a grade report and a CV, so I can evaluate different focus areas to fit your experience.
Betreuer:
Needles in Haystacks
Beschreibung
In a world of multinational production chains, hardware trojans inserted by untrusted third parties are an emerging threat for the security of integrated circuits.
Detection methods have come a long way, but still cannot archieve good performance in realistic scenarios.
During this thesis, you will implement and improve an existing hardware trojan detection method.
Voraussetzungen
The following list of prerequisites is neither complete nor binding, but shall give you an idea, what the topic is about.
- Sufficient knowledge in a High-Level Programming language such as python, because machine learning and reverse engineering tools build on this
- Basic to intermediate knowledge of a hardware description language such as vhdl or verilog for understanding the trojan samples
- Basic knowledge in design/architecture of hardware design to understand trojan location and insertion.
Kontakt
If you are interested in this topic, don't hesitate to ask for an appointment via
Please include a grade report and a CV, so I can evaluate different focus areas to fit your experience.
Betreuer:
Exploring netlist representations for netlist RE
Beschreibung
Reverse engineering of silicon hardware designs is an interesting task for various applications in science and industry, such as patent infringement detection, security analysis or hardware trojan detection.
One of the most challenging tasks is to go from the flat netlist, that is a graph of logic gates and wires between them, to a high level description of the design.
In this work, you will analyze and compare different methods for representing a netlist and the benefits and problems when analyzing the netlist using the different representations
Voraussetzungen
The following list of prerequisites is neither complete nor binding, but shall give you an idea, what the topic is about.
- Sufficient knowledge in a python to use our existing framework
- Basic knowledge of a hardware description language such as vhdl or verilog to understand what you are analyzing
- Basic knowledge in graph theory, algorithms etc. to cope with problems on the way.
Kontakt
If you are interested in this topic, don't hesitate to ask for an appointment via
Please include a grade report and a CV, so I can evaluate different focus areas to fit your experience.
Betreuer:
Implementation of Hardware Trojans
Beschreibung
In a world of multinational production chains, hardware trojans inserted by untrusted third parties are an emerging threat for the security of integrated circuits.
In order to develop methods for hardware trojan detection, specimens of hardware trojans are needed. Unfortunately, the variety of specimen currently available is very low.
During this thesis, you will implement a hardware trojan for a FPGA or ASIC circuit.
Voraussetzungen
The following list of prerequisites is neither complete nor binding, but shall give you an idea, what the topic is about.
- Sufficient knowledge in a High-Level Programming language such as python for designing an interface
- Basic to intermediate knowledge of a hardware description language such as vhdl or verilog for designing the trojan
- Basic knowledge in design/architecture of cryptographic algorithms / CPUs to know where a trojan might be injected
Kontakt
If you are interested in this topic, don't hesitate to ask for an appointment via
Please include a grade report and a CV, so I can evaluate different focus areas to fit your experience.
Betreuer:
Studentische Hilfskräfte
Performant Trace Recording with Streaming Mode
Beschreibung
Oscilloscope Trace Recording requires quick data processing, low-level driver API handling, high level post-processing, all highly configurable for scientific applications. To increase performance on the oscilloscope side, it is important to use the streaming mode, that is near real-time recording from the scope. This creates tight constraints for data processing on the computer side, as Samples will arrive with 1.2 GBit/s
In this thesis, you will continue development of a skeleton application for this task, written in Rust
Voraussetzungen
The following list of prerequisites is neither complete nor binding, but shall give you an idea, what the topic is about.
- Sufficient knowledge in a System-Level Programming language such as C/C++/Rust etc. as a baseline for programming abilities
- Basic to intermediate knowledge of Rust, to be able to actually enhance the status quo in Rust. Learning on the job is possible, probably.
- In the optimum case experience with (Side-Channel) Trace Measurement, to understand the environment of the program
Kontakt
If you are interested in this topic, don't hesitate to ask for an appointment via
Please include a grade report and a CV, so I can evaluate different focus areas to fit your experience.
Betreuer:
Exploring netlist representations for netlist RE
Beschreibung
Reverse engineering of silicon hardware designs is an interesting task for various applications in science and industry, such as patent infringement detection, security analysis or hardware trojan detection.
One of the most challenging tasks is to go from the flat netlist, that is a graph of logic gates and wires between them, to a high level description of the design.
In this work, you will analyze and compare different methods for representing a netlist and the benefits and problems when analyzing the netlist using the different representations
Voraussetzungen
The following list of prerequisites is neither complete nor binding, but shall give you an idea, what the topic is about.
- Sufficient knowledge in a python to use our existing framework
- Basic knowledge of a hardware description language such as vhdl or verilog to understand what you are analyzing
- Basic knowledge in graph theory, algorithms etc. to cope with problems on the way.
Kontakt
If you are interested in this topic, don't hesitate to ask for an appointment via
Please include a grade report and a CV, so I can evaluate different focus areas to fit your experience.
Betreuer:
Entwicklung von Werkzeugen für das Reverse Engineering
Beschreibung
Während dem Reverse Engineering von digitalen Schaltungen trifft man oft auf Probleme, deren Komplexität durch Automatisierung besser beherrscht werden kann. Viele Tools müssen dabei an die spezifische Forschung angepasst werden und helfen dann dabei, mit Standard-IC-Design-Werkzeugen weiterzuarbeiten.
Beispielsweise erhält man eine Netzliste, die mit einer unbekannten Zellbibliothek synthetisiert wurden. Nun ist es notwendig, die verwendete Zellbibliothek zu reverse-engineeren, z.B. mithilfe der Pin und Zell-Namen und daraus eine einfache Bibliothek herzustellen, mit der die Netzliste dann mit den Standard-Tools verarbeitet werden kann.
In dieser Ingenieurspraxis arbeiten Sie eng mit einem Wissenschaftler im Reverse Engineering-Bereich zusammen und erstellen ein oder mehrere hochwertige Werkzeuge für das Reverse Engineering von Netzlisten.
Kontakt
If you are interested in this topic, don't hesitate to ask for an appointment via
Please include a grade report and a CV, so I can evaluate different focus areas to fit your experience.