Analyze possible side channel attacks on crypto FPGA platform.
- Crypto FPGA, VHDL, MicroSemi, Altera, Xilinx, SCA, DPA, EM, DFA, TEMPEST
- Duration: 6-12 months
- Context: Hbo, WO stage
Customized high-security hardware based on crypto algorithms in FPGA is vulnerable for Side Channel attacks. This is done via measurement of the power supply or Electro Magnetic emissions. Also Fault injection can be applied via Glitching, EM-pulse, Flash or even Laser to do a Differential Fault Analysis. The Inspector tool from Riscure, company in Delft, can be used to attack the target through correlation of captured data-traces.
- Analyze possible side channel attacks on crypto FPGA platform
- Perform attacks
- Investigate possible counter measures
- Upgrade FPGA design
- Prove effectiveness the new crypto platform
- Detection, Data analytics, Parsing, Databases
- Duration: 5-10 months
- Context: HBO/WO thesis
Having lots of data and searching through it all is hard. This is especially true if there is unstructured data from multiple different types of systems and protocols. How can we best solve this problem?
Research into structuring and analysing unstructured data
Produce a PoC on how this could work with data coming from a multitude of sources such as network data logs, host based
logs, file data logs, DNS logs, and other sources.
Please share your CV and motivation with us (vacature[at]fox-it.com). In case of questions please send us an email (vacature[at]fox-it.com).