AbstractThe following topics are dealt with: physically unclonable functions; hardware trojans; dangers of counterfeit electronic components: detection challenges, solutions and policies; and side-channel attacks and fault attacks.
The following topics are dealt with: physically unclonable functions; hardware trojans; dangers of counterfeit electronic components: detection challenges, solutions and policies; and side-channel attacks and fault attacks.