Tech Design Forums
Technique
security
security
All
(16)
Articles
(14)
Guides
(2)
May 24, 2014
Hardware trojan attacks and countermeasures
IC designers are becoming increasingly worried about the possibility of third parties inserting malicious 'trojan' circuitry into their ICs.
Guide | Topics:
IP - Assembly & Integration
,
EDA - IC Implementation
,
Verification
| Tags:
design security
,
hardware trojan
,
root of trust
,
secure IP
,
security
,
side-channel analysis
January 15, 2012
Virtualization
Virtualization makes it possible to run multiple operating system images on one processor core – with benefits for memory protection, power efficiency and cost reduction.
Guide | Topics:
Embedded - Platforms
| Tags:
hypervizor
,
low-power design
,
security
,
virtualization
Embedded Topics
Architecture & Design
Integration & Debug
Platforms
User Experience
PLATINUM SPONSORS
View All Sponsors
twitter
facebook
RSS
Tech Design Forum
Log In
Register
Sponsors
Briefing
EDA
EDA TOPICS
DFM
DFT
ESL
IC Implementation
Verification
MORE EDA
Expert Insights
Guides
EDA Home Page
IP
IP TOPICS
Assembly & Integration
Design Management
Selection
MORE IP
Expert Insights
Guides
IP Home Page
PCB
PCB TOPICS
Design Integrity
Layout & Routing
System Codesign
MORE PCB
Expert Insights
Guides
PCB Home Page
Embedded
EMBEDDED TOPICS
Architecture & Design
Integration & Debug
Platforms
User Experience
MORE EMBEDDED
Expert Insights
Guides
Embedded Home Page
Search