The design of chip anti-tamper protection needs to adapt and scale with rising threats. Adversaries range from high school hackers to well-funded state actors. Given the threats, it’s useful to think about anti-tamper countermeasures as a hierarchy of safeguards that parallel the type, effort and expense of attacks.
The anti-tamper defenses for a chip need to anticipate the motivation, skill and funding of potential attackers. For instance, if a chip is going into a military platform that could fall into the hands of a state-actor adversary, then it should be hardened against the full range of tampering attacks. This webinar will explore the categories of tampering attacks and the countermeasures that can be used to guard against them.
In this webinar, you will learn:
- Eleven kinds of tampering attacks and their required skills and resources
- Anti-tamper countermeasures for each of these attacks
- How these countermeasures can be implemented in security products
Complete the form to watch the webinar.