Describe the lifecycle of a modern electronic hardware / ASIC design.
1. Classify the attacks on hardware IPs in terms of the attacker’s origin and intent. Briefly describe possible attack instances of hardware Trojan and IC overproduction.
2. How can an IP be exploited via reverse engineering? Briefly explain potential attack instances of reverse engineering.
3. Describe the typical development lifecycle of an FPGA-based product.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here