Lest we forget that software isn't the only thing to be suspicious about the security of:
"In this work, we propose several novel Hardware Trojans that can be placed into RISC-V cores post-layout in an untrusted manufacturing environment. Next, we propose a non-invasive analytical method ... to detect ..."
https://semiengineering.com/detecting-hardware-trojans-in-a-risc-v-cores-post-layout-phase/
#security #hardware #ChipDesign #Trojan #HardwareTrojan #SupplyChain
"In this work, we propose several novel Hardware Trojans that can be placed into RISC-V cores post-layout in an untrusted manufacturing environment. Next, we propose a non-invasive analytical method ... to detect ..."
https://semiengineering.com/detecting-hardware-trojans-in-a-risc-v-cores-post-layout-phase/
#security #hardware #ChipDesign #Trojan #HardwareTrojan #SupplyChain
🚲🦝 