Hardware security covers a broad range of topics from trusted computing to Trojan circuits. To classify these topics we follow the different hardware abstraction layers as introduced by the Y-chart of Gajski& Kuhn. The different layers of the hardware design process will be introduced.
18th October 2019