AUTHORS:
L. Biswas, L. Lavdas, T. Rahman, M. Tehranipoor, and N. Asadi
Various probing methodologies have been developed in the semiconductor industry to perform failure analysis of an integrated circuit. However, these probing techniques can be misused to launch security attacks and extract sensitive information from the hardware. In this article, the authors provide an overview of such attacks and present probable countermeasures and their limitations.