Completed
How are Hardware Trojans Inserted?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
ICAS - An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Hardware is the Foundation!
- 3 State of Systems Security
- 4 Hardware Development Process
- 5 Outsourcing Reduces Trust
- 6 Hardware Flaws
- 7 Untrusted Foundry Defenses
- 8 Integrated Circuit Construction
- 9 How are Hardware Trojans Inserted?
- 10 ICAS: Integrated Circuit Attack Surface
- 11 ICAS Metrics
- 12 Justification for Metrics
- 13 Evaluation
- 14 Preventive Layout-Level Defenses
- 15 Attack Surface with Undirected Defense
- 16 Conclusion
- 17 Questions?