Topic for Software Praktikum Security Engineering WS 2017-2018
The Security Engineering group of TU Darmstadt (http://www.seceng.de/) is looking for students to work on a practical course (Praktikum) which will award 9 ECTS credit points in Winter Semester 2017-2018.
Topic for the SoftwarePrarktikum
Testing memory-based PUFs under different conditions, evaluating the entropy of strong PUFs, or building a novel fuzzy extractor implementation
The students will have to produce code for such embedded devices, in order to EITHER:
→ access (read through a UART connection and write through the code) their SRAM, DRAM and/or Flash memory,
→ evaluate the entropy and randomness of strong PUFs, based on their performance against the NIST suite tests, and/or
→ produce efficient fuzzy extractors, incorporating error correction mechanisms based on the Reed-Solomon or the Reed-Muller schemes, that can be used with PUFs, as PUF responses may be slightly noisy between subsequent measurements.
Then, the students may also help testing these PUFs or against different conditions (temperature, radiation, charging voltage) through the use of your code. Additionally, the students will have to write a short report regarding the code produced and other potential results. Experiments may be conducted in collaboration with the Electrical Engineering and/or Physics departments of our university or other internal or external partners and institutions, such as Klinikum Darmstadt.
The tasks mentioned are fully scalable and can be combined or separated further, based on the team size and progress and will NOT be assigned as one huge task. In particular, these positions can be highly customised regarding exact requirements, working hours and deadlines, in order to fit different student profiles. However, the total amount of hours and the quality of the work must correspond to 9 ECTS credit points.
You need to:
→ be creative and willing to work towards your goal.
→ be able to adhere to rules and guidelines.
→ have good programming skills in C and C++, especially for embedded systems.
→ be able to work on both Windows and Linux.
→ be able to write reports and present your results in English.
Comprehensive hands-on experience in embedded systems and evaluation boards is a major advantage, but not a formal requirement.
If you're interested in working on this exciting topic and on contacting practical radiation experiments on memories and other key storage components, please contact:
→ http://www.seceng.informatik.tu-darmsta ... stopoulos/
Register on TUCaN: 20-00-0981-pp Project Lab Security Engineering