How to combat hardware Trojans by detecting microchip manipulations


Security flaws can be found not only in software but can also be embedded in hardware, making technological applications vulnerable to a wide range of attacks. To counteract these hardware Trojans, researchers from Germany’s Ruhr University Bochum and the Max Planck Institute for Security and Privacy are developing cutting-edge detection methods.

By comparing chip blueprints with electron microscope images of the actual chips, their sophisticated system can spot discrepancies. In 37 out of 40 cases, this ground-breaking strategy was successful in identifying anomalies.

Read More…