Abstract

Various probing methodologies have been developed in the semiconductor industry to perform failure analysis of an integrated circuit. However, these probing techniques can be misused to launch security attacks and extract sensitive information from the hardware. In this article, the authors provide an overview of such attacks and present probable countermeasures and their limitations.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call