Finding Hardware Trojans

Why locating security threats in hardware is so difficult.


John Hallman, product manager for trust and security at OneSpin Technologies, looks at how to identify hardware Trojans in a design, why IP from different vendors makes this more complicated, and how a digital twin can provide a reference point against which to measure if a design has been compromised.

Leave a Reply

(Note: This name will be displayed publicly)