Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a 15-minute IEEE conference talk presenting a real-world hardware Trojan detection case study spanning four modern CMOS technology generations. Delve into the Red Team vs. Blue Team approach as researchers from Max Planck Institute for Security and Privacy, Université catholique de Louvain, Ruhr University Bochum, and Bundeskriminalamt investigate the challenges and methodologies of identifying malicious hardware modifications. Gain insights into the evolving landscape of hardware security across different CMOS technologies and learn about the latest techniques employed by both attackers and defenders in this critical field of cybersecurity.