This book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. The author discusses and analyzes t
This book describes techniques to verify the authenticity of integrated circuits (ICs). It details a variety of detection schemes and design methodologies for improving Trojan detection techniques.