Explore a 15-minute IEEE conference talk presenting a real-world hardware Trojan detection case study spanning four modern CMOS technology generations. Delve into the Red Team vs. Blue Team approach as researchers from Max Planck Institute for Security and Privacy, Université catholique de Louvain, Ruhr University Bochum, and Bundeskriminalamt investigate the challenges and methodologies of identifying malicious hardware modifications. Gain insights into the evolving landscape of hardware security across different CMOS technologies and learn about the latest techniques employed by both attackers and defenders in this critical field of cybersecurity.
Overview
Syllabus
A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations
Taught by
IEEE Symposium on Security and Privacy