Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore hardware security vulnerabilities and protection mechanisms in this conference session from CHES 2025, chaired by Shahin Tajik. Delve into the critical topics of hardware trojans - malicious modifications to integrated circuits that can compromise system security - and logic locking techniques used as countermeasures to protect intellectual property and prevent unauthorized access to circuit functionality. Learn about the latest research developments in detecting, preventing, and mitigating hardware trojans, while understanding how logic locking serves as both a security mechanism and a potential attack vector. Gain insights into the ongoing arms race between attackers seeking to insert malicious functionality into hardware designs and defenders developing sophisticated protection schemes. Discover cutting-edge methodologies for analyzing circuit behavior, identifying suspicious modifications, and implementing robust security measures in modern semiconductor devices.