Skip navigation

FPGA Group

1 Post authored by: Eavesdropper
Product counterfeiters are increasingly targeting chips and electronic components, with attacks on hardware modules becoming commonplace. Tailor-made security technology utilizes a component‘s individual material properties to generate a digital key. This provides components with an identity, since their unique structure cannot be copied. At this year’s embedded world Exhibition and Conference, researchers from the Fraunhofer Institute for Secure Information Technology SIT will be de ...

Filter Blog

By date: By tag: