In the second part of a series of articles devoted to hardware Trojan examples of their implementation and insertion into integrated circuits are given.

sitemap

Разработка: студия Green Art