Exploiting Ring Oscillators to Leak Secret Information
The manufacturing of hardware is a complex process where many different types of parties are involved. This creates risks of inserting hidden harmful parts, so called Hardware Trojans (HTs). HTs can have many different functions, such as reducing security, leaking information or degrading a system. This thesis examines how Ring Oscillators (ROs) can be exploited by a malicious party and modified t
