作者: Anatoly Belous , Vitali Saladukha
DOI: 10.1007/978-3-030-47218-4_7
关键词: Computer hardware 、 Section (archaeology) 、 Identification (information) 、 Computer science
摘要: This section is essentially a systematized review of the results studies dedicated to methods counteracting hardware Trojans in microcircuits. It should be said from very beginning that there are no such countermeasures would ensure absolute protection threats. As noted above, allow 100% identification defects manufactured