Foto von Michael Pehl

Dr.-Ing. Michael Pehl

Technische Universität München

Lehrstuhl für Sicherheit in der Informationstechnik (Prof. Sigl)

Dienstort

Lehrstuhl für Sicherheit in der Informationstechnik (Prof. Sigl)

Work:
Theresienstr. 90(0101)/I
80333 München

Short CV

Michael Pehl received his Dr.-Ing. degree in 2012 from the Technische Universität München. His thesis with title "Discrete Sizing of Analog Integrated Circuits" was carried out at the Institute for Electronic Design Automation and focused on the development of optimization algorithms for yield-aware analog sizing considering discrete design parameters. For this work he received the Kurt-Fischer Prize in 2013.
Since 2012 he is researcher and teaching associate at the Institute for Security in Information Technology. The focus of his current research is on the field of Physical Unclonable Functions (PUFs). Further research interests include topics like side channel analysis and tools to support secure design. He is teaching different courses as stated below.


Topics for Theses and Internships

BAMAIDPFPIPSHK
Titel
--

Side - channel analysis of error - correcting codes for PUFs

Side - channel analysis of error - correcting codes for PUFs

Beschreibung

Physical Unclonable Functions (PUFs) exploit manufacturing process variations to generate unique signatures. PUF and error-correcting codes can be joined together to reliably generate cryptographically strong keys. However, the implementation of error-correcting codes is prone to physical attacks like side-channel attacks. Side-channel attacks exploit the information leaked during the computation of secret intermediate states to recover the secret key. Therefore, the implementation of error-correcting codes must also involve the implementation of proper countermeasures against side-channel attacks.

The goal of this thesis is to evaluate the side-channel resistance of a secure implementation of error-correcting codes for PUFs on FPGA. The thesis consists of the following steps:

  • Get familiar with currently available implementations of error-correcting codes for PUFs
  • Adapt and improve current implementations (VHDL)
  • Develop a measurement setup for side-channel analysis (Matlab/Python)
  • Perform side-channel analysis using the state-of-the-art EMF measurement equipment in our lab (Oscilloscope knowledge + Matlab/Python required)

Voraussetzungen

 The ideal candidate should have:

  • Previous experience in field of digital design (VHDL/Vivado/Xilinx FPGA)
  • Basic knowledge on using lab equipment (e.g Oscilloscope,...)
  • Basic knowledge in statistics
  • Good programming skills in Matlab/Python
  • Attendance at the lecture “Secure Implementation of Cryptographic Algorithms” is advantageous

 

Kontakt

Dr.-Ing. Michael Pehl
Chair for Security in Information Technology
Head: Prof. Dr.-Ing. Georg Sigl
Technical University of Munich
Arcisstr. 21, 80333 Munich (Germany)

Email: m.pehl@tum.de

Betreuer:

Michael Pehl, Lars Tebelmann

Further Topics on Physical Unclonable Functions

Further Topics on Physical Unclonable Functions

Beschreibung

Silicon based Physical Unclonable Functions (PUFs) are security primitives which can be used to derive device unique identities. Such identities can be used to identify a device or to derive a secret key.

You are interested in research in the field of Physical Unclonable Functions but you think that the topics which are listed on our page do not fit your previous knowledge or think there is no perfect match to what you are interested in? No problem! Please contact me at any time for advice regarding your thesis/student job. I can offer to

  • help you with your decision for/against some topic.
  • suggest probably further topics which are not advertised, yet.
  • bring you into contact with other members of our chair or at Fraunhofer AISEC.

Voraussetzungen

Plese send me an email which exhaustively describes your previous knowledge (e.g. your last grading sheet and a short CV) to allow me to prepare and to give you reasonable advice. Also, please provide 3-5 dates, which fit to your schedule, for a meeting.

Kontakt

Dr.-Ing. Michael Pehl
Chair for Security in Information Technology
Head: Prof. Dr.-Ing. Georg Sigl
Technical University of Munich
Arcisstr. 21, 80333 Munich (Germany)

Email: m.pehl@tum.de

Betreuer:

---

Tool Exploration for PUF-Analysis

Tool Exploration for PUF-Analysis

Beschreibung

Physical Unclonable Functions (PUFs) exploit manufacturing process and physical environmental variations to generate unique signatures. These signatures can be used for key generation or in challenge-response protocols. In both cases it is important to have unpredictable PUF-responses.

In this work, a tool for statistical analysis should be explored w.r.t. it's applicability of PUFs.

During the course of the thesis, the following should be done:

  • Get familiar with PUFs and their requirements as well as with the tool which should be applied to PUFs
  • Define a test set for the tool using known unpredictable and predictable real world PUF-responses and virtual data.
  • Apply the tool to evaluate the usability and the limits
  • Justify found limitations mathematicaly.

This work can be conducted in German or English. Please contact the thesis supervisor for further details. In case of a high qulaity of the work, results might be published.

Voraussetzungen

  • Good mathematical skills (especiall in stochastics)
  • Good programming skills in C/C++

Kontakt

Dr.-Ing. Michael Pehl
Chair for Security in Information Technology
Head: Prof. Dr.-Ing. Georg Sigl
Technical University of Munich
Arcisstr. 21, 80333 Munich (Germany)

Email: m.pehl@tum.de

Betreuer:

---

Security Analysis of PUFs

Security Analysis of PUFs

Beschreibung

Physical Unclonable Functions (PUFs) exploit manufacturing process and physical environmental variations to generate unique signatures. These signatures can be used for key generation or in challenge-response protocols. In both cases it is important to have unpredictable PUF-responses.

Several approaches have been suggested to evaluate the quality of a PUF regarding unpredictability. This work attempts to follow a more holistic approach.

During the course of the thesis, the following should be done (the tasks are scheduled for a Master thesis; for other kinds of theses subtasks will be selected):

  • Get familiar with state-of-the-art analysis methods for PUFs
  • Define the requirements and a test set for the new approach
  • Define the new holistic approach for the PUF-evaluation.
  • Realize a prototypical implementation of the evaluation approach.
  • Evaluate the new approach.

This work can be conducted in German or English. Please contact the thesis supervisor for further details. In case of a high qulaity of the work, results might be published.

 

Voraussetzungen

  • Good mathematical skills (especiall in stochastics)
  • Good programming skills in C/C++

Kontakt

Dr.-Ing. Michael Pehl
Chair for Security in Information Technology
Head: Prof. Dr.-Ing. Georg Sigl
Technical University of Munich
Arcisstr. 21, 80333 Munich (Germany)

Email: m.pehl@tum.de

Betreuer:

--

Implementation of a Secure System Based on PUFs

Implementation of a Secure System Based on PUFs

Beschreibung

Physical Unclonable Functions (PUFs) exploit manufacturing process and physical environmental variations to generate unique signatures. These signatures can be used for key generation or in challenge-response protocols.

In this work, a secure system should be implemented on FPGA, which uses a PUF to enable security features. For this purpose, an existing PUF-implementation with corresponding key derivation must be transfered to the targetplattform. Afterwards, a operating system must be taken into operation on the target platform and  security mechanisms for the system must be established based on the PUF.

During the course of the thesis, the following should be covered (the tasks are scheduled for a Master thesis; for other kinds of theses subtasks will be selected):

  • Get familiar with the target platform and requirements for the thesis
  • Plan and conduct the implemementation.
  • Test the implementation, e.g. w.r.t. performance

This work can be conducted in German or English. The results of this work will be used in the BMBF funded project ALESSIO. Please contact the thesis supervisor for further details. In case of a high qulaity of the work, results might be published.

Voraussetzungen

  • Good VHDL skills
  • Good MC programming skills
  • Good knowledge about security mechanisms (e.g. through the lecture Embedded Systems and Security)

Kontakt

Dr.-Ing. Michael Pehl
Chair for Security in Information Technology
Head: Prof. Dr.-Ing. Georg Sigl
Technical University of Munich
Arcisstr. 21, 80333 Munich (Germany)

Email: m.pehl@tum.de

Betreuer:

--

Compression Algorithms for PUFs

Compression Algorithms for PUFs

Beschreibung

Physical Unclonable Functions (PUFs) exploit manufacturing process and physical environmental variations to generate unique signatures. These signatures can be used for key generation or in challenge-response protocols. In both cases it is important to have high entropy in the PUF-response. However, since response bits of a PUF might be correlated, computation of entropy is not trivial. Therefore, compression algorithms are used to approximate the entropy in a PUF-response.

The goal of the project is to compare different compression algorithms and to apply them to different real world data sets measured from PUFs.

The thesis will include the following steps (the tasks are scheduled for a Master thesis; for other kinds of theses subtasks will be selected):

  • Get familiar with currently available compression algorithms.
  • Implementation of selected compression algorithms and adaption to special requirements in the PUF-context (C++).
  • Definition of a test setup and test of the implemented algorithms.
  • Evaluation of different real-world PUFs using the implemented algorithms.

This work can be conducted in German or English. Please contact the thesis supervisor for further details. In case of a high qulaity of the work, results might be published.

References:

  • Ignatenko, T.; Schrijen, G.-J.; Skoric, B.; Tuyls, P.; Willems, F.;"Estimating the Secrecy Rate of Physical Uncloneable Functions with the Context-Tree Weighting Method"; ISIT 2006

 

Voraussetzungen

  • Good mathematical skills (especiall in stochastics)
  • Good programming skills in C/C++

Kontakt

Dr.-Ing. Michael Pehl
Chair for Security in Information Technology
Head: Prof. Dr.-Ing. Georg Sigl
Technical University of Munich
Arcisstr. 21, 80333 Munich (Germany)

Email: m.pehl@tum.de

Betreuer:

Michael Pehl, Florian Wilde

Ongoing Theses and Internships

BAMAIDPFPIPSHK
Titel
-----

Implementation of a Sensitized Path PUF on Xilinx FPGA

Implementation of a Sensitized Path PUF on Xilinx FPGA

Beschreibung

Physical Unclonable Functions (PUFs) exploit manufacturing process and physical environmental variations to generate unique signatures. These signatures can be used for key generation or in challenge-response protocols.

In this work, a Sensized Path PUF should be implemented and evaluated on XILINX FPGA. This PUF type uses the configuration capabilities of LUTs on FPGAs to increase the amount of extracted entropy per area compared to, e.g. standard RO implementations.

During the course of the thesis, the following should be covered:

  •     Get familiar with sensitized path PUFs
  •     Plan and conduct the implemementation on a Basys3 Board
  •     Test the implementation with state of the art quality metrics for PUFs.


This work can be conducted in German or English. Please contact the thesis supervisor for further details. In case of a high qulaity of the work, results might be published.

References:

  • L. Feiten, M. Sauer, B. Becker; "Implementation of Delay-Based PUFs on Altera FPGAs"; HOST 2017; https://doi.org/10.1007/978-3-319-44318-8_11

Voraussetzungen

  • Good VHDL skills

Kontakt

Dr.-Ing. Michael Pehl
Chair for Security in Information Technology
Head: Prof. Dr.-Ing. Georg Sigl
Technical University of Munich
Arcisstr. 21, 80333 Munich (Germany)

Email: m.pehl@tum.de

Betreuer:

-----

Exploration of Context Tree Weighting as a Compression Algorithms for Physical Unclonable Functions

Exploration of Context Tree Weighting as a Compression Algorithms for Physical Unclonable Functions

Beschreibung

Physical Unclonable Functions (PUFs) extract secrets from inherently available manufacturing variations in hardware. One criterion for the quality of PUFs is the entropy which can be extracted from it. However, entropy cannot be computed accuratly in these cases. Thus, a bound for  entropy is computed by compression.

The approach which is used for the approximation by compression in the context of PUFs is the Context Tree Weighting Method (CTW). During the course of the thesis the following should covered (tasks are scheduled for a Master thesis; for other kinds of theses subtasks will be selected).

1. Research, what properites make CTW a good candidate for entropy evaluation of PUFs and compare to other approaches.

2. Improve a given implementation of CTW to improve accuracy and to improve the benefit gained from the analysis.

3. Analysis of the CTW implementation w.r.t. the realized improvements.

This work can be conducted in German or English. Please contact the thesis supervisor for further details. In case of a high qulaity of the work, results might be published.

References:

  • Ignatenko, T.; Schrijen, G.-J.; Skoric, B.; Tuyls, P.; Willems, F.;"Estimating the Secrecy Rate of Physical Uncloneable Functions with the Context-Tree Weighting Method"; ISIT 2006

 

Voraussetzungen

  • Good mathematical skills (especiall in stochastics)
  • Good programming skills in C/C++

Kontakt

Dr.-Ing. Michael Pehl
Chair for Security in Information Technology
Head: Prof. Dr.-Ing. Georg Sigl
Technical University of Munich
Arcisstr. 21, 80333 Munich (Germany)

Email: m.pehl@tum.de

Betreuer:


List of Publications

2018

  • Sepulveda, Johanna and Willgerodt, Felix and Pehl, Michael: SEPUFSoC: Using PUFs for Memory Integrity and Authentication in Multi-Processors System-on-Chip. ACM Great Lakes Symposium on VLSI, { GLSVLSI} 2018, 2018Chicago, USA mehr… BibTeX
  • Wilde, Florian and Gammel, Berndt M. and Pehl, Michael: Spatial Correlation Analysis on Physical Unclonable Functions. IEEE Transactions on Information Forensics and Security 13 (6), 2018, 1468-1480 mehr… BibTeX

2017

  • Nisha Jacob and Jakob Wittmann and Johann Heyszl and Robert Hesselbarth and Florian Wilde and Michael Pehl and Georg Sigl and Kai Fisher: Securing FPGA SoC Configurations Independent of Their Manufacturers. 30th IEEE International System-on-Chip Conference SOCC, 2017Munich, Germany mehr… BibTeX
  • Pehl, Michael and Hiller, Matthias and Sigl, Georg: Secret Key Generation for Physical Unclonable Functions – Secret Key Generation and Authentication. In: Rafael F. Schaefer and Holger Boche and Ashish Khisti and H. Vincent Poor (Hrsg.): Information Theoretic Security and Privacy of Information Systems. Cambridge University Press, 2017, 362-389 mehr… BibTeX
  • Tebelmann, Lars and Pehl, Michael and Sigl, Georg: EM Side-Channel Analysis of BCH-based Error Correction for PUF-based Key Generation. Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security (ASHES '17), ACM, 2017New York, NY, USA mehr… BibTeX
  • Tebelmann, Lars and Pehl, Michael and Sigl, Georg: EM Attack on BCH-based Error Correction for PUFs. Cryptotag, 2017Nürnberg, Germany mehr… BibTeX

2016

  • Hiller, M.; Pehl, M.; Kramer, G.; Sigl, G.: Algebraic security analysis of key generation with physical unclonable functions. PROOFS: Security Proofs for Embedded Systems, 2016 mehr… BibTeX
  • Hiller, Matthias and Pehl, Michael and Kramer, Gerhard and Sigl, Georg: Algebraic Security Analysis of Key Generation with Physical Unclonable Functions. PROOFS 2016: Security Proofs for Embedded Systems , 2016Santa Barbara, CA, USA mehr… BibTeX
  • Wilde, Florian and Gammel, Berndt and Pehl, Michael: Spatial Correlations in Physical Unclonable Functions. Final Conference on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE 2016), 2016Barcelona, Spain mehr… BibTeX

2015

  • Hiller, Matthias and Pehl, Michael and Sigl, Georg: Fehlerkorrekturverfahren zur sicheren Schlüsselerzeugung mit Physical Unclonable Functions. Datenschutz und Datensicherheit - DuD (Volume 39, Issue 4, ), 2015, pp 229-233 mehr… BibTeX
  • Hiller, Matthias and Yu, Meng-Day (Mandel) and Pehl, Michael: Systematic Low Leakage Coding for Physical Unclonable Functions. ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2015Singapore mehr… BibTeX
  • Pehl, Christian Michael; Hiller, Matthias; Graeb, Helmut: Efficient Evaluation of Physical Unclonable Functions Using Entropy Measures. Journal of Circuits, Systems, and Computers, 2015 mehr… BibTeX
  • Pehl, Michael and Hiller, Matthias and Graeb, Helmut: Efficient Evaluation of Physical Unclonable Functions Using Entropy Measures. Journal of Circuits, Systems and Computers (Vol. 25, No. 1 (2016) 1640001 ), 2015, 23 pages mehr… BibTeX
  • Pehl, Michael and Wilde, Florian and Gammel, Berndt and Sigl, Georg: Qualitätsevaluierung von Physical Unclonable Functions als Schlüsselspeicher. 14. Deutscher IT-Sicherheitskongress, 2015Bonn, Deutschland mehr… BibTeX

2014

  • Pehl, Michael Pehl and Seuschek, Hermann: Herausforderungen der ganzheitlichen Absicherung eingebetteter Systeme. Datenschutz und Datensicherheit - DuD, 2014, Volume 38, Issue 11 , pp 757-761 mehr… BibTeX
  • Pehl, Michael, Punnakkal, Akshara Ranjit, Hiller, Matthias and Graeb, Helmut: Advanced Performance Metrics for Physical Unclonable Functions. International Symposium on Integrated Circuits (ISIC), 2014Singapore mehr… BibTeX
  • Pehl, Michael; Punnakkal, Akshara Ranjit; Hiller, Matthias; Graeb, Helmut: Advanced Performance Metrics for Physical Unclonable Functions. International Symposium on Integrated Circuits (ISIC), 2014 mehr… BibTeX
  • Wilde, Florian and Hiller, Matthias and Pehl, Michael: Statistic-based Security Analysis of Ring Oscillator PUFs. International Symposium on Integrated Circuits (ISIC), 2014Singapore mehr… BibTeX

2013

  • Hiller, Matthias and Sigl, Georg and Pehl, Michael: A New Model for Estimating Bit Error Probabilities of Ring-Oscillator PUFs. ReCoSoC 2013, 2013Darmstadt, Deutschland mehr… BibTeX

2012

  • Pehl, Michael; Graeb, Helmut: Tolerance Design of Analog Circuits Using a Branch-and-Bound Based Approach. Journal of Circuits, Systems, and Computers, 2012 mehr… BibTeX

2011

  • Pehl, Michael; Graeb, Helmut: An SQP and Branch-and-Bound Based Approach for Discrete Sizing of Analog Circuits – 13. In: Tlelo-Cuautle, Esteban (Hrsg.): Advances in Analog Circuits. InTech, 2011, 297-316 mehr… BibTeX
  • Pehl, Michael; Zwerger, Michael; Graeb, Helmut: Variability-Aware Automated Sizing of Analog Circuits Considering Discrete Design Parameters. International Symposium on Integrated Circuits (ISIC), 2011 mehr… BibTeX

2010

  • Pehl, Michael; Graeb, Helmut: Dimensionierung Analoger Schaltungen mit diskreten Parametern unter Verwendung eines Zufalls- und Gradientenbasierten Ansatzes. ITG/GMM-Fachtagung Entwurf von analogen Schaltungen mit CAE-Methoden (ANALOG), 2010 mehr… BibTeX
  • Pehl, Michael; Zwerger, Michael; Graeb, Helmut: Sizing Analog Circuits Using an SQP and Branch and Bound Based Approach. IEEE International Conference on Electronics, Circuits and Systems (ICECS), 2010 mehr… BibTeX

2009

  • Pehl, Michael; Graeb, Helmut: RaGAzi: A Random and Gradient-Based Approach to Analog Sizing for Mixed Discrete and Continuous Parameters. International Symposium on Integrated Circuits (ISIC), 2009 mehr… BibTeX

2008

  • Pehl, M.; Massier, T.; Graeb, H.; Schlichtmann, U.: Optimierung analoger Schaltungen mit geordneten diskret veränderlichen Parametern. 10. GMM/ITG-Fachtagung Analog, 2008April 2008, Siegen mehr… BibTeX
  • Pehl, M.; Massier, T.; Graeb, H.; Schlichtmann, U.: A Random and Pseudo-Gradient Approach for Analog Circuit Sizing with Non-Uniformly Discretized Parameters. International Conference on Computer Design 2008 (ICCD 2008), IEEE, 2008OCTOBER 12-15,2008;Resort at Squaw Creek, Lake Tahoe CA, 188-193 mehr… BibTeX