Hardware Security

protect IP

Secure IC Design

The old way of delivering a product to market was to reuse as much IP as possible and verify that the correct functionality has been achieved. Todays secure systems such as smart cards and embedded systems can no longer rely on this design method.

“Read More”

rootoftrust training provides the skills to counteract attacks

Attacking Hardware

Embedded devices can be attacked in numerous ways to leak privileged information. These attacks focus on vulnerabilities in the implementation of secure functions or in the chip itself. Countermeasures have been proposed to tackle these vulnerabilities singularly however attackers now use multiple attacks to achieve the same aim. The most popular attacks are described below.

“Read More”