Lest we forget that software isn't the only thing to be suspicious about the security of:
"In this work, we propose several novel Hardware Trojans that can be placed into RISC-V cores post-layout in an untrusted manufacturing environment. Next, we propose a non-invasive analytical method ... to detect ..."
https://semiengineering.com/detecting-hardware-trojans-in-a-risc-v-cores-post-layout-phase/
#security #hardware #ChipDesign #Trojan #HardwareTrojan #SupplyChain
Detecting Hardware Trojans In a RISC-V Core's Post-Layout Phase

A new technical paper “Trojan-D2: Post-Layout Design and Detection of Stealthy Hardware Trojans – A RISC-V Case Study” was published by researchers at University of Bremen, DFKI GmbH, and the... » read more

Semiconductor Engineering