An occurrence of one or more hardware Trojans or weaknesses that could be exploited or triggered by an attacker to violate system security policies. Vulnerabilities may result from malicious interventions, bugs, flaws, and unforeseen misuse scenarios. Vulnerabilities are associated with specific products or systems.
Security used to be about systems and software. As threats evolve, hardware engineers also have to familiarize themselves with trust and security terms and acronyms. If you are a hardware engineer interested in hardware trust and security, be sure to bookmark this page. If you spot a mistake or have ideas for enhancements, please get in touch.