Once upon a time, secure hardware was only needed for mil-aero and banking systems. Today, numerous industrial and consumer applications require special hardware to protect data required for digital rights management, electronic wallets, private encryption keys, or medical information.
Current methodologies to verify that such hardware is impervious to attack and/or the data within remains s...
» read more