Tech Design Forums
Technique
counterfeiting
counterfeiting
All
(2)
Articles
(1)
Guides
(1)
October 14, 2017
Making security a profit center for silicon
The assumption has been that extra security eats into profit margins. But with some lateral thinking it can actually improve the bottom line.
Expert Insight | Topics:
IP - Assembly & Integration
,
Design Management
,
EDA - DFT
,
IC Implementation
,
Embedded - Integration & Debug
| Tags:
cloning
,
configuration
,
counterfeiting
,
fingerprinting
,
firmware
,
mask
,
PUF
,
security
,
upgrade
| Organizations:
Siemens EDA
May 26, 2014
Design for security
Design for security is an emerging topic in hardware engineering demanding a more holistic approach that traditional cryptographic implementation.
Guide | Topics:
EDA - IC Implementation
| Tags:
counterfeiting
,
design security
,
obfuscation
,
reverse engineering
,
side-channel analysis
EDA Topics
DFM
DFT
ESL
IC Implementation
Verification
PLATINUM SPONSORS
View All Sponsors
twitter
facebook
RSS
Tech Design Forum
Log In
Register
Sponsors
Briefing
EDA
EDA TOPICS
DFM
DFT
ESL
IC Implementation
Verification
MORE EDA
Expert Insights
Guides
EDA Home Page
IP
IP TOPICS
Assembly & Integration
Design Management
Selection
MORE IP
Expert Insights
Guides
IP Home Page
PCB
PCB TOPICS
Design Integrity
Layout & Routing
System Codesign
MORE PCB
Expert Insights
Guides
PCB Home Page
Embedded
EMBEDDED TOPICS
Architecture & Design
Integration & Debug
Platforms
User Experience
MORE EMBEDDED
Expert Insights
Guides
Embedded Home Page
Search