Application Specific Integrated Circuit (ASIC) Hardware Security
From Philip Young
plethora of opportunities for malicious entities to compromise the seciruty of the
supply chain. Since Hardware is the root of trust for any secure system, it is vital
to safeguard hardware IPs and supply chains against such potential attacks. In our
research, we focus on mitigating some of these main vulnerabilities. IP piracy &
counterfeiting, Hardware Trojan Insertion and Side Channel leakage analysis.