How to Train Your Hardware Trojan Detector: Reverse-Engineering into an Underrated Threat
This talk will deep dive into the world of hardware Trojans. We will discuss how they are inserted, how they function and how they might be detected. In particular, we will focus on the feasibility in real life designs, and whether current detection methods can really...
