<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=iso-8859-1"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:RubFlama;
panose-1:2 0 0 0 0 0 0 0 0 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
p.MsoNoSpacing, li.MsoNoSpacing, div.MsoNoSpacing
{mso-style-priority:1;
margin:0cm;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-fareast-language:EN-US;}
p.msonormal0, li.msonormal0, div.msonormal0
{mso-style-name:msonormal;
mso-margin-top-alt:auto;
margin-right:0cm;
mso-margin-bottom-alt:auto;
margin-left:0cm;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
span.E-MailFormatvorlage19
{mso-style-type:personal-compose;
font-family:"Calibri",sans-serif;
color:windowtext;}
span.E-MailFormatvorlage20
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;
font-family:"Calibri",sans-serif;
mso-fareast-language:EN-US;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:70.85pt 70.85pt 2.0cm 70.85pt;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=DE link="#0563C1" vlink="#954F72"><div class=WordSection1><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;font-family:RubFlama;color:#8DAE10'>Bochum, January 12, 2023<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;font-family:RubFlama'><o:p> </o:p></span></p><p class=MsoNormal><b><span lang=EN-US style='font-size:12.0pt;font-family:RubFlama;color:#003560'>New Emmy Noether Group Aims to Make Hardware Chips Provable Secure<o:p></o:p></span></b></p><p class=MsoNoSpacing style='text-align:justify;line-height:115%'><i><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>Dr. Pascal Sasdrich (Chair of Security Engineering) will be funded by the DFG with 1.3 million euros for his project CAVE.<o:p></o:p></span></i></p><p class=MsoNormal style='text-align:justify;line-height:115%'><b><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'><o:p> </o:p></span></b></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>In 2023, the German Research Foundation (DFG) funds a new Emmy Noether group in the field of IT security at Ruhr-Universität Bochum. Dr. Pascal Sasdrich, Chair of Security Engineering/Faculty of Computer Science is the research group leader. With his project <b>“COMPUTER-AIDED VERIFICATION OF PHYSICAL SECURITY PROPERTIES“, CAVE</b> for short, he wants to advance the protection of security-critical implementations, such as those used in hardware chips, against physical attacks. Within the Emmy-Noether program, CAVE is funded with 1.3 million euros over six years, which qualifies for a university professorship.<o:p></o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'><o:p> </o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><b><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>Many Chips Are not Verifiably Secure<o:p></o:p></span></b></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'><o:p> </o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>In our digital environment, we use numerous objects that contain embedded chips. These hardware elements are nowadays quite small but hold important functions. “To put it simply, a chip encrypts or decrypts data by cryptographic processes“, explains Sasdrich. From EC cards to IoT devices for the smart home: concerning sensitive data, users rely on trusting the technology. The more surprising it seems is that many chips are not verifiably secure. That means they cannot withstand all kinds of attacks, Sasdrich says. “Pen-Testing is often done in the commercial world using best practices. If the prototype can withstand the tested attacks, it might be promoted as secure“, Sasdrich said. <o:p></o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'><o:p> </o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>But there are many ways to attack, and testing exhaustively is often impossible. For example, an attacker uses the power consumption of the chips to infer information about security-critical data. In IT security, this is called a side-channel attack. It could be used to break the encryption of secret information.<o:p></o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'><o:p> </o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><b><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>CAVE May Ease Developers' Workload<o:p></o:p></span></b></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'><o:p> </o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>Implementation of security in technical components, however, costs time and money - and requires technical expertise. Tasks such as protection against side-channel analysis (SCA) or fault injection analysis (FIA) are sophisticated and error-prone, even with years of experience, Sasdrich said. In contrast, some attacks targeting these chips don't require much effort. This makes them a real threat.<o:p></o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'><o:p> </o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>That's why Sasdrich's project aims to develop methods that can be used during the design process to verify components' ability to withstand attacks. They can ease the developers' workload by enabling automated and computer-aided testing even before the prototype is created. These procedures have the potential to increase the security of future developments.<o:p></o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'><o:p> </o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><b><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>Long-Term Goal: Provable Security for an Entire Processor<o:p></o:p></span></b></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'><o:p> </o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>The research group's work is based on two principles. The first is based on scientifically formalizing the attacker models. By doing so, they can prove the security of their assumptions. The other is to develop tools and programs based on the formalized attacker models that can be used during the chip design process.<o:p></o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'><o:p> </o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>Initially, Sasdrich's research group will focus on cryptographic functions. The long-term goal, he says, remains to work toward provable security for an entire processor. This would be a valuable contribution by the Bochum scientists to the protection of our sensitive data.<o:p></o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'><o:p> </o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'><o:p> </o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><b><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>Press Contact<o:p></o:p></span></b></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>Dr.-Ing. Pascal Sasdrich<o:p></o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>Faculty of Computer Science<o:p></o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>Universitätsstr. </span><span style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>150<o:p></o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>D-44801 Bochum<o:p></o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>T.: (+49)(0)234 / 32 - 25734<o:p></o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>E-Mail: Pascal.Sasdrich@rub.de<o:p></o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><span style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'><o:p> </o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:115%'><i><span lang=EN-US style='font-size:10.0pt;line-height:115%;font-family:RubFlama;color:#003560'>General note: In case of using gender-assigning attributes we include all those who consider themselves in this gender regardless of their own biological sex.<o:p></o:p></span></i></p><p class=MsoNormal style='text-align:justify;line-height:115%'><i><span lang=EN-US style='font-size:10.0pt;line-height:115%;font-family:RubFlama;color:#003560'><o:p> </o:p></span></i></p><p class=MsoNormal style='text-align:justify;line-height:115%'><b><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>For more news about IT Security Research in Bochum, please visit </span></b><b><u><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#8DAE10;mso-fareast-language:DE'><a href="https://hgi.rub.de/en/news"><span style='color:#8DAE10'>our website</span></a></span></u></b><b><span lang=EN-US style='font-size:12.0pt;line-height:115%;font-family:RubFlama;color:#003560'>.<o:p></o:p></span></b></p><div style='mso-element:para-border-div;border:none;border-bottom:solid windowtext 1.0pt;padding:0cm 0cm 1.0pt 0cm'><p class=MsoNormal style='border:none;padding:0cm'><span lang=EN-US style='font-size:12.0pt;font-family:RubFlama;color:#003560'><o:p> </o:p></span></p></div><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;font-family:RubFlama'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;font-family:RubFlama;color:#003560'>Kind regards<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;font-family:RubFlama;color:#003560'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;font-family:RubFlama;color:#003560'>Christina Scholten<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;font-family:RubFlama;color:#003560'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;font-family:RubFlama;color:#003560;mso-fareast-language:DE'>RUHR-UNIVERSITÄT BOCHUM<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;font-family:RubFlama;color:#8DAE10;mso-fareast-language:DE'>Horst Görtz Institut for IT Security/ Cluster of Excellence CASA <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;font-family:RubFlama;color:#1F497D;mso-fareast-language:DE'>Marketing and Public Relations<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;font-family:RubFlama;color:#1F497D;mso-fareast-language:DE'>MC EG 78, Post Box MC 3<o:p></o:p></span></p><p class=MsoNormal><span style='font-size:12.0pt;font-family:RubFlama;color:#1F497D;mso-fareast-language:DE'>Universitätsstr. 150<o:p></o:p></span></p><p class=MsoNormal><span style='font-size:12.0pt;font-family:RubFlama;color:#1F497D;mso-fareast-language:DE'>44780 Bochum, Germany<o:p></o:p></span></p><p class=MsoNormal><span style='font-size:12.0pt;font-family:RubFlama;color:#1F497D;mso-fareast-language:DE'>Tel: +49-(0)234-32-29274<o:p></o:p></span></p><p class=MsoNormal><span style='font-size:12.0pt;font-family:RubFlama;color:#1F497D;mso-fareast-language:DE'>E-Mail</span><span style='font-size:12.0pt;font-family:RubFlama;color:#003560;mso-fareast-language:DE'>: </span><u><span style='font-size:12.0pt;font-family:RubFlama;color:#8DAE10;mso-fareast-language:DE'><a href="mailto:christina.scholten@rub.de"><span style='font-family:"Calibri",sans-serif;color:#8DAE10;mso-fareast-language:EN-US'>christina.scholten@rub.de</span></a><o:p></o:p></span></u></p><p class=MsoNormal><u><span style='font-size:12.0pt;font-family:RubFlama;color:#8DAE10;mso-fareast-language:DE'><o:p><span style='text-decoration:none'> </span></o:p></span></u></p><p class=MsoNormal><u><span style='font-size:12.0pt;font-family:RubFlama;color:#8DAE10;mso-fareast-language:DE'><a href="http://www.hgi.rub.de/"><span style='font-family:"Calibri",sans-serif;color:#8DAE10;mso-fareast-language:EN-US'>www.hgi.rub.de</span></a> <o:p></o:p></span></u></p><p class=MsoNormal><u><span style='font-size:12.0pt;font-family:RubFlama;color:#8DAE10;mso-fareast-language:DE'><a href="http://www.casa.rub.de/"><span style='font-family:"Calibri",sans-serif;color:#8DAE10;mso-fareast-language:EN-US'>www.casa.rub.de</span></a><o:p></o:p></span></u></p><p class=MsoNormal><span style='font-size:12.0pt;font-family:RubFlama'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;font-family:RubFlama;color:#1F497D;mso-fareast-language:DE'>To unsubscribe from any further information from the Horst Görtz Institute for IT Security, follow </span><span lang=EN-US style='font-size:12.0pt;font-family:RubFlama;color:#8DAE10;mso-fareast-language:DE'><a href="https://lists.ruhr-uni-bochum.de/mailman/listinfo/hgi-news-international"><span style='color:#8DAE10'>this link</span></a></span><span lang=EN-US style='font-size:12.0pt;font-family:RubFlama;color:#1F497D;mso-fareast-language:DE'>.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt'><o:p> </o:p></span></p></div></body></html>