ABSTRACT

The pervasive use of hardware devices makes them vulnerable to physical attacks due to their easy availability to adversaries. To have a secure “digital life”, we need to ensure the security of the hardware components along with that of the software. As mentioned in previous chapters, hardware counterfeiting is pervasive in the modern world, and causes great revenue loss to the hardware industry. It also compromises a user’s safety and security as she is unsure about the origin of the electronic devices being used, which might carry out surreptitious malicious activities.