Protecting ICs Against Specific Threats

Considerations and fixes for hardware attacks.


Identifying potential vulnerabilities and attack vectors is a first step in addressing them. Anders Nordstrom, security application engineer at Tortuga Logic, talks with Semiconductor Engineering about the growing risk of remote hardware attacks, what to do when a chip is hacked, and where to find the most common weaknesses for chips.

Leave a Reply

(Note: This name will be displayed publicly)