Kursbeschreibung
How Does Your Design Get Pirated? Pirates work in many ways depending on the goal they want to achieve. Sometimes just copying a system can lead to easy money. While other times stealing the IP and mixing it with their own IP to develop a new system can be the reason to crack open a chip. With significant corporate profits at stake, system security has never been more important.
Learning the possible threats involve: Reverse engineering, Cloning, Over building and Tempering.
Solutions at hand: Cryptography, Anti-Counterfeiting , S/W integrity, Temper preventing, Full integration with XILINX, ALTERA and LATTICE.
Voraussetzungen
Kursprogramm auf Anforderung
Zielgruppe
Senior FPGA Designers, with more than 3 years of experience.