1-6 of 6 Search Results for

malicious hardware attack

Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
EDFA Technical Articles (2019) 21 (3): 16–24.
Published: 01 August 2019
... serve as trust verification tools and provides practical guidelines for making hardware more secure. This article presents a comprehensive study of physical inspection and attack methods, describing the approaches typically used by counterfeiters and adversaries as well as the risks and threats...
Journal Articles
EDFA Technical Articles (2019) 21 (2): 30–36.
Published: 01 May 2019
... be employed to provide trust and assurance when dealing with commercial off-the-shelf chips. Copyright © ASM International® 2019 2019 ASM International counterfeit ICs image analysis machine learning malicious hardware attack reverse engineering trust and assurance 3 0 httpsdoi.org/10.31399...
Journal Articles
EDFA Technical Articles (2022) 24 (2): 24–32.
Published: 01 May 2022
... for malicious attacks. In this article, the authors assess the vulnerabilities inherent in the fabrication of interposers and describe various types of optical attacks along with practical countermeasures. Interposers play an important role in 2.5D and 3D packages, routing power and communication signals...
Journal Articles
EDFA Technical Articles (2021) 23 (3): 13–22.
Published: 01 August 2021
... attack EDFAAO (2021) 3:13-22 httpsdoi.org/10.31399/asm.edfa.2021-3.p013 1537-0755/$19.00 ©ASM International® 13 ELECTRONIC DEVICE FAILURE ANALYSIS | VOLUME 23 NO. 3 THE THREAT OF MALICIOUS CIRCUIT-BOARD ALTERATION: ATTACK TAXONOMY AND EXAMPLES Samuel H. Russ University of South Alabama, Mobile sruss...
Journal Articles
EDFA Technical Articles (2022) 24 (3): 12–22.
Published: 01 August 2022
..., such as layouts and test vectors.[1] Recently, image processing-based physical inspection techniques have drawn much attention because of the advancement in the microscopy field as a means to detect malicious circuitry (such as logic cells) insertion, deletion, or modification which are known as hardware Trojans...
Journal Articles
EDFA Technical Articles (2022) 24 (4): 22–29.
Published: 01 November 2022
... a detailed and methodical discussion about how existing and emerging memory devices can fall prey to attacks through various physical modalities. These physical attacks[2] are a well-defined class of hardware attacks, constituting both reverse engineering and fault injection threats. With the increase...