Star 0

Abstract

In this talk, we will discuss actual trends on hardware trojan design and implementation. We will analyze different attack techniques based on implementation details and countermeasures. Furthermore, we will present a demonstration of malicious logic in a commercial microprocessor and also a low-cost hardware trojan which exfiltrates data using radio signals.