Something went wrong
An error occurred, please try again later.
Application Specific Integrated Circuit (ASIC) Hardware Security
From Philip Young April 07, 2022
61 plays
61
0 comments
0
You unliked the media.
Related Media
Kevin Immanuel Gubbi
Abstract: Due to the globalization of the semiconductor IC supply chain, there has been a
plethora of opportunities for malicious entities to compromise the seciruty of the
supply chain. Since Hardware is the root of trust for any secure system, it is vital
to safeguard hardware IPs and supply chains against such potential attacks. In our
research, we focus on mitigating some of these main vulnerabilities. IP piracy &
counterfeiting, Hardware Trojan Insertion and Side Channel leakage analysis.
plethora of opportunities for malicious entities to compromise the seciruty of the
supply chain. Since Hardware is the root of trust for any secure system, it is vital
to safeguard hardware IPs and supply chains against such potential attacks. In our
research, we focus on mitigating some of these main vulnerabilities. IP piracy &
counterfeiting, Hardware Trojan Insertion and Side Channel leakage analysis.
- Tags
- Appears In
Link to Media Page
Loading
Loading…