List providing a comprehensive dictionary of known patterns of attack employed by adversaries to exploit known weaknesses in cyber-enabled capabilities. https://capec.mitre.org
Security used to be about systems and software. As threats evolve, hardware engineers also have to familiarize themselves with trust and security terms and acronyms. If you are a hardware engineer interested in hardware trust and security, be sure to bookmark this page. If you spot a mistake or have ideas for enhancements, please get in touch.