h1

h2

h3

h4

h5
h6
% IMPORTANT: The following is UTF-8 encoded.  This means that in the presence
% of non-ASCII characters, it will not work with BibTeX 0.99 or older.
% Instead, you should use an up-to-date BibTeX implementation like “bibtex8” or
% “biber”.

@PHDTHESIS{Reimann:1011859,
      author       = {Reimann, Lennart Michael},
      othercontributors = {Leupers, Rainer and Kunz, Wolfgang},
      title        = {{P}rotecting confidentiality in hardware design : {EDA}
                      tools for security awareness},
      school       = {Rheinisch-Westfälische Technische Hochschule Aachen},
      type         = {Dissertation},
      address      = {Aachen},
      publisher    = {RWTH Aachen University},
      reportid     = {RWTH-2025-04758},
      pages        = {1 Online-Ressource : Illustrationen},
      year         = {2025},
      note         = {Veröffentlicht auf dem Publikationsserver der RWTH Aachen
                      University; Dissertation, Rheinisch-Westfälische Technische
                      Hochschule Aachen, 2025},
      abstract     = {The exponential growth in complexity of Integrated Circuits
                      (ICs) over recent decades has created critical challenges
                      for ensuring hardware security. The rapid rise in hardware
                      complexity has rendered manual design nearly impossible,
                      driving the widespread adoption of automated tools as
                      essential components in modern design processes. Electronic
                      Design Automation (EDA) tools offer crucial support to
                      designers throughout the development process. However,
                      current EDA tools focus primarily on optimizing traditional
                      metrics like power, performance, and area, with insufficient
                      consideration of security properties. This gap has led to
                      the emergence of serious hardware vulnerabilities. Such
                      vulnerabilities at the hardware level can undermine the
                      security of entire computing systems, exposing sensitive
                      data and causing significant financial and reputational
                      damage. Enhancing EDA tools and hardware design approaches
                      with built-in security considerations represents an evolving
                      priority for the semiconductor sector. While security-aware
                      EDA tools have begun to appear on the market, their
                      integration into standard industry practices is progressing
                      slowly. The hardware industry has been reluctant to adopt
                      security-aware EDA tools as they often compromise
                      traditional design goals and complicate the development
                      process. To address this reluctance, this thesis introduces
                      novel methodologies and automated tools for detecting
                      confidentiality vulnerabilities during the design phase.
                      These contributions aim to overcome industry concerns that
                      have impeded the integration of security measures in
                      hardware design. The exponential increase in digital data
                      makes confidentiality crucial for privacy and security,
                      driving our research to enhance confidentiality measures.
                      This thesis presents three main contributions: First, a
                      comprehensive evaluation of security assessment techniques
                      is conducted, comparing manual inspection, repurposed
                      manufacturing testing tools, and dedicated security
                      frameworks. Examining the limitations of these approaches
                      reveals key opportunities for advancing automated security
                      analysis frameworks further. Second, addressing these
                      opportunities, a novel quantitative framework for assessing
                      information leakage in hardware designs is developed. This
                      framework assigns metrics to leakages, allowing designers to
                      prioritize vulnerabilities based on severity. Third, for
                      hardware vulnerabilities that cannot be eliminated, an
                      automated formal verification framework is presented to
                      ensure that software does not exploit them. The developed
                      frameworks allow for early detection of vulnerabilities,
                      quantitative assessment of their severity, and verification
                      of software-level mitigations, addressing industry adoption
                      concerns.},
      cin          = {611910},
      ddc          = {621.3},
      cid          = {$I:(DE-82)611910_20140620$},
      typ          = {PUB:(DE-HGF)11},
      doi          = {10.18154/RWTH-2025-04758},
      url          = {https://publications.rwth-aachen.de/record/1011859},
}