Building a Comprehensive Hardware Security Methodology from enumeration methodology Watch Video
Preview(s):
Gallery
Play Video: (Note: The default playback of the video is HD VERSION. If your browser is buffering the video slowly, please play the REGULAR MP4 VERSION or Open The Video below for better experience. Thank you!)
⏲ Duration: 36 min 63 sec ✓ Published: 14-Jun-2022
Description: Workshop presented at DVCon U.S. 2022nnPresented by Tortuga LogicnnBy: Anders Nordstrom, Tortuga Logic; Jagadish Nayak, Tortuga LogicnnThere has been an exponential growth in hardware security vulnerabilities over the last several years. To address this, many companies have created dedicated security teams that span across the organization. For example, marketing, legal departments and design and verification engineers are frequently involved to effectively mitigate and understand the security r
Play Video: (Note: The default playback of the video is HD VERSION. If your browser is buffering the video slowly, please play the REGULAR MP4 VERSION or Open The Video below for better experience. Thank you!)