Hoe ziet je dag eruit?
Pioneer new approaches to compact-model, design, implement and test hardware security solutions What you will do The influence of semiconductor technology on cybersecurity is essential, yet often not recognized. Semiconductor technology evolves rapidly and in multiple directions. Continued device scaling, as per Moore's law, gives potential attackers much stronger computation power. It means that also security solutions need to follow. These solutions require origin of trust. A origin of trust is the ability to create and store, in a secure way, keys and other confidential material which can be trustfully used in cryptographic algorithms and protocols. Security also entails verification required in IC supply chains: how can you prevent third-party contract manufacturers to produce extra copies of your legitimate IC design, which they want to sell for their own benefit, or, reselling already used, hence aged and degraded, ICs with reduced remaining operating lifetime? Novel technologies and new usage of existing semiconductor technologies and circuits, provide novel opportunities to make these origin of trust. Physically Unclonable Functions (PUFs) or True random number generators are such essential building blocks to provide freshness, and nonces into security protocols. Yet randomness requires understanding of physical phenomena, e.g. jitter, metastability or device degradation, in semiconductor technologies. In this position, you will work in the Advanced Reliability, Robustness, and Test (AR2T) department in imec, while interacting with security experts of COSIC, KU Leuven. In the context of this job, you will have the possibility to work on multiple projects that emphasize the strong interaction between IC technology and security. Specifically, you will: Pioneer new approaches to compact-model, design, implement and test hardware security solutions that can measure the use (or abuse) of integrated circuits and/or detect and protect devices from emerging threats, such fault injection Explore novel techniques for device identification and authentication Perform vulnerability assessments on prototype hardware Work closely with imec's interdisciplinary teams—such as logic device and memory integration teams—to evaluate security features across device architectures. Share your research through scientific publications, patents, and presentations at industry-leading conferences