Abstract
This article presents a comprehensive study of physical inspection and attack methods, describing the approaches typically used by counterfeiters and adversaries as well as the risks and threats created. It also explains how physical inspection methods can serve as trust verification tools and provides practical guidelines for making hardware more secure.
This content is only available as a PDF.
Copyright © ASM International® 2019
2019
ASM International
You do not currently have access to this content.