{"id":7229,"date":"2023-03-21T12:32:17","date_gmt":"2023-03-21T11:32:17","guid":{"rendered":"https:\/\/www.velektronik.de\/?page_id=7229"},"modified":"2024-06-26T13:51:16","modified_gmt":"2024-06-26T11:51:16","slug":"velektronik-analyse","status":"publish","type":"page","link":"https:\/\/www.velektronik.de\/en\/velektronik-analyse\/","title":{"rendered":"Analysis"},"content":{"rendered":"<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-center\" style=\"grid-template-columns:41% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"698\" height=\"466\" src=\"https:\/\/www.velektronik.de\/wp-content\/uploads\/2023\/03\/analysemethode-velektronik-2.jpg\" alt=\"\" class=\"wp-image-7337 size-full\" srcset=\"https:\/\/www.velektronik.de\/wp-content\/uploads\/2023\/03\/analysemethode-velektronik-2.jpg 698w, https:\/\/www.velektronik.de\/wp-content\/uploads\/2023\/03\/analysemethode-velektronik-2-400x267.jpg 400w, https:\/\/www.velektronik.de\/wp-content\/uploads\/2023\/03\/analysemethode-velektronik-2-18x12.jpg 18w\" sizes=\"auto, (max-width: 698px) 100vw, 698px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h3 class=\"wp-block-heading\">Current research topics<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Object of analysis<\/li>\n\n\n\n<li>Analysis methods<\/li>\n\n\n\n<li>PUF<\/li>\n\n\n\n<li>Standards<\/li>\n<\/ul>\n\n\n\n<p>Contact: Frank Altmann (Fraunhofer IMWS) and Horst Gieser (Fraunhofer EMFT)<\/p>\n\n\n\n<div class=\"wp-block-buttons has-custom-font-size has-small-font-size is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-fdcfc74e wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link has-background wp-element-button\" href=\"mailto:frank.altmann@imws.fraunhofer.de\" style=\"background-color:#009374\" target=\"_blank\" rel=\"noreferrer noopener\">Contact<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Analysis methods<\/h2>\n\n\n\n<p>The current tense global political situation as well as the ongoing bottlenecks in global supply chains make trusted electronics a key topic for research and industry. Analytical methods and security features for safeguarding functional and information technology safety (Safety &amp; Security) are indispensable tools for ensuring the trustworthiness of microelectronic components.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Physical analysis methods<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reverse engineering and counterfeit detection of components<\/li>\n\n\n\n<li>Hardware Trojan Detection Methods<\/li>\n\n\n\n<li>Detection methods for counterfeit components<\/li>\n\n\n\n<li>Safety feature inspection methods<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.velektronik.de\/wp-content\/uploads\/2023\/03\/roentgeninspektion-gefaelschtes-bauelement-fehlende-drahtbondverbindungen-1.jpg\" alt=\"\" class=\"wp-image-7330\" srcset=\"https:\/\/www.velektronik.de\/wp-content\/uploads\/2023\/03\/roentgeninspektion-gefaelschtes-bauelement-fehlende-drahtbondverbindungen-1.jpg 500w, https:\/\/www.velektronik.de\/wp-content\/uploads\/2023\/03\/roentgeninspektion-gefaelschtes-bauelement-fehlende-drahtbondverbindungen-1-400x400.jpg 400w, https:\/\/www.velektronik.de\/wp-content\/uploads\/2023\/03\/roentgeninspektion-gefaelschtes-bauelement-fehlende-drahtbondverbindungen-1-150x150.jpg 150w, https:\/\/www.velektronik.de\/wp-content\/uploads\/2023\/03\/roentgeninspektion-gefaelschtes-bauelement-fehlende-drahtbondverbindungen-1-12x12.jpg 12w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption class=\"wp-element-caption\"><em>X-ray inspection of a counterfeit component with missing wire bond connections<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">PUF<\/h2>\n\n\n\n<p>The wireless transmission of confidential data between mobile devices has increased dramatically in recent years, particularly in the context of trends such as the Internet of Things. In this context, security functions implemented directly in the hardware (electronic chip), so-called <em>Physical unclonable functions<\/em> (PUFs), are implemented directly in the hardware (electronic chip) to improve protection against misuse of data by third parties. Other applications include the storage of digital keys and the generation of random numbers. The Velektronik platform offers customer-specific solutions for planning, implementing and analyzing the security functions.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Uniqueness\/Non-Copyable<\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The fingerprint of the PUF is unique and cannot be copied by controllable processes<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">Robustness<\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The PUF response is invariant to external influences (temperature, radiation)<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">Unpredictable PUF response<\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Es ist unm\u00f6glich PUF Antworten vorherzusagen, die man vorher nicht ausgelesen hat<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">Intrusion\/readout protection <\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Property of the PUF to change its PUF response on a detected readout attempt<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Analysemethoden Die derzeit angespannte weltpolitische Lage sowie die anhaltenden Engp\u00e4sse bei globalen Lieferketten machen vertrauensw\u00fcrdige Elektronik zu einem Schl\u00fcsselthema f\u00fcr Forschung und Industrie. Analysemethoden und Sicherheitsmerkmale zur Absicherung von funktionaler und informationstechnischer Sicherheit (Safety &amp; Security) sind unerl\u00e4ssliche Werkzeuge, um&#8230;<\/p>","protected":false},"author":10,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-fullwidth.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7229","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Analyse<\/title>\n<meta name=\"description\" content=\"Analysemethoden und Sicherheitsmerkmale zur Absicherung von funktionaler und informationstechnischer Sicherheit. Jetzt mehr erfahren!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.velektronik.de\/en\/velektronik-analyse\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analyse\" \/>\n<meta property=\"og:description\" content=\"Analysemethoden und Sicherheitsmerkmale zur Absicherung von funktionaler und informationstechnischer Sicherheit. Jetzt mehr erfahren!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.velektronik.de\/en\/velektronik-analyse\/\" \/>\n<meta property=\"og:site_name\" content=\"Velektronik\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-26T11:51:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.velektronik.de\/wp-content\/uploads\/2023\/03\/analysemethode-velektronik-2.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.velektronik.de\\\/velektronik-analyse\\\/\",\"url\":\"https:\\\/\\\/www.velektronik.de\\\/velektronik-analyse\\\/\",\"name\":\"Analyse\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.velektronik.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.velektronik.de\\\/velektronik-analyse\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.velektronik.de\\\/velektronik-analyse\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.velektronik.de\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/analysemethode-velektronik-2.jpg\",\"datePublished\":\"2023-03-21T11:32:17+00:00\",\"dateModified\":\"2024-06-26T11:51:16+00:00\",\"description\":\"Analysemethoden und Sicherheitsmerkmale zur Absicherung von funktionaler und informationstechnischer Sicherheit. Jetzt mehr erfahren!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.velektronik.de\\\/velektronik-analyse\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.velektronik.de\\\/velektronik-analyse\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.velektronik.de\\\/velektronik-analyse\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.velektronik.de\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/analysemethode-velektronik-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.velektronik.de\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/analysemethode-velektronik-2.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.velektronik.de\\\/velektronik-analyse\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.velektronik.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Analyse\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.velektronik.de\\\/#website\",\"url\":\"https:\\\/\\\/www.velektronik.de\\\/\",\"name\":\"Velektronik\",\"description\":\"Vertrauensw\u00fcrdige Elektronik\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.velektronik.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.velektronik.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.velektronik.de\\\/#organization\",\"name\":\"Velektronik\",\"url\":\"https:\\\/\\\/www.velektronik.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.velektronik.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.velektronik.de\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/velektronik_logo_rgb.png\",\"contentUrl\":\"https:\\\/\\\/www.velektronik.de\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/velektronik_logo_rgb.png\",\"width\":1000,\"height\":284,\"caption\":\"Velektronik\"},\"image\":{\"@id\":\"https:\\\/\\\/www.velektronik.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Analysis","description":"Analysis methods and security features for safeguarding functional and IT security. Find out more!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.velektronik.de\/en\/velektronik-analyse\/","og_locale":"en_GB","og_type":"article","og_title":"Analyse","og_description":"Analysemethoden und Sicherheitsmerkmale zur Absicherung von funktionaler und informationstechnischer Sicherheit. Jetzt mehr erfahren!","og_url":"https:\/\/www.velektronik.de\/en\/velektronik-analyse\/","og_site_name":"Velektronik","article_modified_time":"2024-06-26T11:51:16+00:00","og_image":[{"url":"https:\/\/www.velektronik.de\/wp-content\/uploads\/2023\/03\/analysemethode-velektronik-2.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.velektronik.de\/velektronik-analyse\/","url":"https:\/\/www.velektronik.de\/velektronik-analyse\/","name":"Analysis","isPartOf":{"@id":"https:\/\/www.velektronik.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.velektronik.de\/velektronik-analyse\/#primaryimage"},"image":{"@id":"https:\/\/www.velektronik.de\/velektronik-analyse\/#primaryimage"},"thumbnailUrl":"https:\/\/www.velektronik.de\/wp-content\/uploads\/2023\/03\/analysemethode-velektronik-2.jpg","datePublished":"2023-03-21T11:32:17+00:00","dateModified":"2024-06-26T11:51:16+00:00","description":"Analysis methods and security features for safeguarding functional and IT security. Find out more!","breadcrumb":{"@id":"https:\/\/www.velektronik.de\/velektronik-analyse\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.velektronik.de\/velektronik-analyse\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.velektronik.de\/velektronik-analyse\/#primaryimage","url":"https:\/\/www.velektronik.de\/wp-content\/uploads\/2023\/03\/analysemethode-velektronik-2.jpg","contentUrl":"https:\/\/www.velektronik.de\/wp-content\/uploads\/2023\/03\/analysemethode-velektronik-2.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.velektronik.de\/velektronik-analyse\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.velektronik.de\/"},{"@type":"ListItem","position":2,"name":"Analyse"}]},{"@type":"WebSite","@id":"https:\/\/www.velektronik.de\/#website","url":"https:\/\/www.velektronik.de\/","name":"Velektronik","description":"Trusted Electronics","publisher":{"@id":"https:\/\/www.velektronik.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.velektronik.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.velektronik.de\/#organization","name":"Velektronik","url":"https:\/\/www.velektronik.de\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.velektronik.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.velektronik.de\/wp-content\/uploads\/2021\/03\/velektronik_logo_rgb.png","contentUrl":"https:\/\/www.velektronik.de\/wp-content\/uploads\/2021\/03\/velektronik_logo_rgb.png","width":1000,"height":284,"caption":"Velektronik"},"image":{"@id":"https:\/\/www.velektronik.de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.velektronik.de\/en\/wp-json\/wp\/v2\/pages\/7229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.velektronik.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.velektronik.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.velektronik.de\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.velektronik.de\/en\/wp-json\/wp\/v2\/comments?post=7229"}],"version-history":[{"count":23,"href":"https:\/\/www.velektronik.de\/en\/wp-json\/wp\/v2\/pages\/7229\/revisions"}],"predecessor-version":[{"id":8624,"href":"https:\/\/www.velektronik.de\/en\/wp-json\/wp\/v2\/pages\/7229\/revisions\/8624"}],"wp:attachment":[{"href":"https:\/\/www.velektronik.de\/en\/wp-json\/wp\/v2\/media?parent=7229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}