Tools Group

  • Tools group (SSS)


    The ICE tools group is looking for excellent Ph.D. students and Postdocs which are hired and paid as full-time researchers. Talented people interested in contributing to a leading-edge research institute are invited to submit their application at any time.
    Your tasks:

    • Contribute to ICE´s R&D projects in the areas of algorithms, architectures, and/or design tools
    • Interact…
    more ...

HiWi / WiHi job offers

Hardware-Security: Secure Processor Design:


Dominik Šišejković


Depending on the actual task, the following is essential:

  • Good programming skills in C++ (object-oriented programming)
  • Experience with Python (can be learned in a short time)
  • Linux OS
  • Basic understanding of the hardware design and fabrication flow
  • Some experience with computer architecture
  • Some experience with Verilog
Nice to have:
  • Experience with the Synopsys Design Compiler
  • Experience with ModelSim from Mentor
A background on hardware security is not necessary, but appreciated. In case of interest, please send me an email including the following:
  • Latest transcript of records
  • A brief description of your background and motivation
  • CV (if available)


Nowadays, it has become a major challenge to secure a hardware design from being tampered with while in the hands of external design houses or in the fabrication. These malicious modifications imposed by external parties are known as hardware Trojans. Trojans can lead to serious repercussions, including data leakage, denial of service attacks and others.


Here at the Chair for Software for Systems on Silicon (SSS), we are looking into novel ways of securing hardware designs (in particular processor cores) against hardware Trojans, taking the complexity of modern circuits into account.


We are looking into several aspects of securing a processor design. Some example tasks are as follows:

  • Implementation of novel logic encryption algorithms
  • Exploring new methodologies to secure processor designs
  • Desing of hardware Trojans
  • Evaluation of existing methodologies in terms of area/delay/power vs. security for hardware models of processor cores
  • Hardware security metrics
More information can be found here.