Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Trojans and Logic Locking

TheIACR via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore hardware security vulnerabilities and protection mechanisms in this conference session from CHES 2025, chaired by Shahin Tajik. Delve into the critical topics of hardware trojans - malicious modifications to integrated circuits that can compromise system security - and logic locking techniques used as countermeasures to protect intellectual property and prevent unauthorized access to circuit functionality. Learn about the latest research developments in detecting, preventing, and mitigating hardware trojans, while understanding how logic locking serves as both a security mechanism and a potential attack vector. Gain insights into the ongoing arms race between attackers seeking to insert malicious functionality into hardware designs and defenders developing sophisticated protection schemes. Discover cutting-edge methodologies for analyzing circuit behavior, identifying suspicious modifications, and implementing robust security measures in modern semiconductor devices.

Syllabus

Trojans & Logic Locking (CHES 2025)

Taught by

TheIACR

Reviews

Start your review of Trojans and Logic Locking

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.