Protecting ICs Against Specific Threats

Considerations and fixes for hardware attacks.

popularity

Identifying potential vulnerabilities and attack vectors is a first step in addressing them. Anders Nordstrom, security application engineer at Tortuga Logic, talks with Semiconductor Engineering about the growing risk of remote hardware attacks, what to do when a chip is hacked, and where to find the most common weaknesses for chips.



Leave a Reply


(Note: This name will be displayed publicly)