Home / Critical & Emerging Technologies / Securing the Silicon Heartbeat: Next-Gen Solutions for Counterfeit Electronics and Hardware Trojans

Securing the Silicon Heartbeat: Next-Gen Solutions for Counterfeit Electronics and Hardware Trojans

The Invisible Threat Reshaping Our Digital World

The global electronics supply chain—an intricate network spanning continents and thousands of vendors—is facing a silent but severe crisis. Counterfeit components and hardware Trojans (HTs) are compromising the integrity of everything from life-saving pacemakers to military-grade fighter jets. Counterfeit electronics alone are responsible for an estimated $4.5 trillion in annual losses, while the U.S. military has reported over 1.8 million suspect parts infiltrating its systems. The push toward commercial off-the-shelf (COTS) components has delivered cost-efficiency and rapid innovation but has also amplified exposure to these hardware threats in our hyper-globalized manufacturing ecosystem.

From military defense to healthcare and everyday consumer electronics, the infiltration of substandard or malicious hardware pose severe threat from individual’s health to national security. This article delves into the rising challenges posed by counterfeit electronic components and hardware Trojans and explores the need for innovative detection technologies to safeguard our digital infrastructure.

Anatomy of a Crisis: More Than Just Fake Parts

Counterfeit electronic components refer to unauthorized or imitation parts that are falsely represented as genuine products. These components often find their way into the supply chain, posing serious risks such as system malfunctions, increased failure rates, and vulnerabilities to cyber-attacks. On the other hand, Hardware Trojans are malicious alterations to hardware designs, subtly inserted during the manufacturing process, with the intent to compromise system functionality or security.

Counterfeit electronics are not limited to cheap knock-offs. They often appear as recycled chips re-labeled as new, low-grade clones built with substandard materials, or legitimate components illicitly overproduced and leaked from foundries. These components may cause hidden failures, like latent electrostatic discharge in medical implants, or immediate breakdowns in critical aerospace systems. The 2011 U.S. Senate investigation into counterfeit parts in defense platforms underscored how deeply national security is tied to hardware authenticity.

Hardware Trojans, on the other hand, are a deliberate act of subversion. These tiny, often invisible modifications to circuits—sometimes as simple as flipping a transistor’s polarity—remain dormant until activated under specific triggers. Some HTs are designed to disable systems at predetermined times. Others siphon data, like encryption keys, by subtly altering power consumption patterns. There are even Trojans that manipulate sensor readings to disrupt industrial processes. Because HTs are embedded deep in the circuit and often appear legitimate at every layer of wiring, they evade conventional detection techniques with ease.

Trojan insertion can occur at any stage—during design, fabrication, assembly, or distribution. Malicious IP cores embedded during design introduce backdoors, while altered masks at the fab level can sabotage functionality. Even firmware updates during distribution can inject dormant threats waiting to be activated.

In critical sectors like defense, compromised electronic systems can result in equipment failure, compromising the safety of military personnel. In healthcare, the use of counterfeit components in medical devices can jeopardize patient well-being. Moreover, in the realm of everyday electronics, such as smartphones and laptops, hardware Trojans can lead to data breaches and privacy violations.

Supply Chain Complexity

The global semiconductor supply chain is a labyrinthine network of interdependent stages—including design, fabrication, assembly, packaging, PCB integration, and distribution—often spanning over 14 geographically dispersed facilities. At any point along this journey, vulnerabilities can be introduced, either intentionally or inadvertently. Once deployed, chips may re-enter circulation through unauthorized refurbishment, remarking, or repackaging. Such practices increase the risk of both immediate malfunctions and latent failures, including electrostatic discharge or subtle performance degradation, undermining system reliability in mission-critical applications.

Today’s chips typically pass through more than 14 different facilities before reaching the end-user. This global journey—across design centers, semiconductor fabs, test labs, assembly houses, and distributors—creates numerous blind spots. Refurbished parts with forged documentation re-enter the market undetected. Rogue foundries run unauthorized “ghost shifts” where counterfeit chips or Trojan-infused silicon is produced. And third-party intellectual property cores can conceal harmful logic in ways that evade standard testing.

Printed circuit boards (PCBs) further amplify the security risk, serving as both the physical and logical integration point for multiple components. Their centrality to system functionality makes them prime targets for tampering, cloning, counterfeit insertions, and hardware Trojans. The infamous case involving Supermicro underscores how even a small manipulation at the board level can compromise entire platforms. Moreover, risks in the broader ICT supply chain—such as unauthorized production, theft, insertion of malicious software or hardware, and substandard manufacturing practices—are exacerbated by its globalized, opaque nature. As a result, verifying the authenticity, trustworthiness, and performance integrity of integrated circuits and systems becomes increasingly challenging in the absence of secure-by-design principles and end-to-end provenance tracking.

Hardware Trojans: A Stealthy Threat

Hardware Trojans (HTs) represent a particularly insidious class of threats within the semiconductor ecosystem. These malicious modifications—intentionally inserted at any stage of the design, manufacturing, or testing pipeline—can silently undermine functionality, leak sensitive data, or disable systems entirely. As modern chip production increasingly relies on globally distributed workflows to meet tight time-to-market demands, the opportunities for adversarial intervention multiply. This includes risks such as overbuilding, IP theft, counterfeiting, and Trojan implantation, often occurring without the design house’s knowledge.

HTs can take many stealthy forms: from “time bombs” that trigger system failure under specific conditions, to delay-based logic corruptions that evade detection under normal operation. Detecting these threats requires establishing a root of trust across the entire supply chain—from design to deployment. Researchers have explored techniques like power-based side-channel analysis and voltage switching on supply rails to detect behavioral anomalies. Trojan-induced path delays can also serve as unique signatures. At the pre-silicon stage, a structured four-step methodology has been proposed to identify and isolate malicious insertions, particularly in untrusted third-party intellectual property (IP) blocks. As HTs continue to evolve, proactive detection and design-stage countermeasures are crucial to safeguarding chip integrity.

Detecting and Preventing Hardware Trojans

Detecting hardware Trojans requires a comprehensive, multi-layered approach due to their stealthy and often dormant nature. A foundational measure is establishing a root of trust that extends from the design phase through to the final stages of the supply chain. Researchers have explored the use of side-channel analysis, particularly power consumption patterns, to identify anomalies indicative of malicious alterations. By monitoring subtle voltage fluctuations on supply rails and analyzing variations in gate delay, engineers can improve the observability of embedded Trojans during pre-silicon verification. However, the vast complexity and density of modern integrated circuits continue to pose significant detection challenges, often overwhelming traditional inspection and simulation techniques.

Counterfeit and Trojan detection methodologies generally fall into two broad categories: physical/mechanical tests and electrical performance-based evaluations. While many counterfeit chips can be identified using visual inspection or mechanical analysis, Trojans designed by modifying the polarity of existing transistors—without adding extra circuitry—remain especially elusive. These modifications are indistinguishable under fine-grain optical inspection and even match the original design’s metal and polysilicon layers. In such cases, functional testing, particularly Automatic Test Pattern Generation (ATPG), offers a viable detection strategy. ATPG stimulates a chip’s input ports and observes the outputs for unexpected behaviors that may reveal a Trojan’s activation. This method also proves valuable in identifying trigger patterns in condition-based Trojans, further enhancing its role in modern hardware security verification.

Why Traditional Defenses Fall Short

Detecting counterfeit components and Hardware Trojans (HTs) remains a formidable challenge due to the growing complexity of integrated circuits (ICs) and the sophistication of adversarial techniques. Traditional inspection methods—such as visual checks, functional testing, or random sampling—often fail to identify stealthy Trojans embedded deep within a chip’s architecture. These malicious inclusions can be minuscule, intentionally dormant, or concealed within vast volumes of legitimate design code. As modern ICs can contain billions of transistors and immense hardware description language (HDL) files, comprehensive manual reviews become impractical, especially when numerous individuals across different locations require access at various production stages.

Additionally, the fragmented and globalized nature of today’s semiconductor supply chains creates further blind spots. With components passing through dozens of facilities worldwide—spanning third-party IP providers, fabrication plants, and testing centers—the risk of counterfeit or tampered hardware infiltrating the system is high. These counterfeit parts can be expertly re-marked, repackaged, or cloned with subtle differences that escape traditional verification techniques. While ad hoc verification and formal design methods have been proposed to detect unauthorized modifications, their scalability and practicality in real-world deployments remain limited. A more robust, layered security framework is urgently needed to address these growing threats.

Detection technologies have not kept up with the sophistication of the threat. While X-ray and CT scans are useful, they are prohibitively expensive at scale, often costing over $500,000 per system. Electrical testing cannot detect dormant Trojans that require specific conditions to activate. Optical inspections miss nanoscale modifications altogether. Even Automatic Test Pattern Generation (ATPG), a widely used design verification method, detects only about 40–65% of Trojans due to their trigger specificity and stealth design.

Reverse Engineering

Reverse Engineering (RE) in the context of electronic systems involves the intricate process of recovering a chip’s internal layout, netlist, stored data (such as firmware or memory contents), and its intended functionality. This is achieved through physical disassembly or electrical testing to assess whether a component is authentic or maliciously altered. The effectiveness of RE depends heavily on the availability of golden data—reference materials from known genuine components. These benchmarks, which may include bill of materials (BoM), schematics, known-good layouts, or structural and parametric signatures, are crucial for detecting cloned systems or embedded hardware Trojans. By comparing an unknown chip to its golden counterpart, analysts can pinpoint discrepancies in both structure and behavior.

The reverse engineering workflow typically includes delayering, high-resolution imaging, annotation, and netlist extraction. These steps require access to advanced cleanroom facilities and sophisticated microscopy equipment. The process is labor-intensive and time-consuming, often involving manual or semi-automated post-processing to reconstruct a circuit’s logical map. Nonetheless, recent advancements are streamlining this field. For instance, innovations in plasma etching have significantly improved ion energy control, enabling more precise and automated delayering. These breakthroughs are reducing both cost and complexity, making RE more viable for broader use in security verification.

PCB Counterfeiting

Counterfeiting and hardware Trojan insertion are not limited to integrated circuits—they are equally pressing concerns in the realm of printed circuit boards (PCBs). Unlike chips, where various integrity validation techniques have matured over time, PCBs lack similarly robust, scalable methods for detecting tampering or verifying authenticity. This is especially troubling given that PCBs form the structural and functional backbone of electronic systems, interconnecting numerous components and subsystems. Because traditional chip-level security mechanisms are not easily adapted to PCB-level protection, these vulnerabilities pose a significant risk to the reliability and trustworthiness of complex electronics.

To address this issue, researchers and manufacturers have begun leveraging intrinsic physical characteristics of PCBs to create unique identifiers for each board. One method involves using the distinctive patterns formed by surface vias—the small vertical interconnects within the PCB’s layered structure—as a kind of fingerprint. These naturally occurring variations can be captured through high-resolution imaging and matched against reference data to verify authenticity. Another method relies on the inherent material and structural inconsistencies introduced during the fabrication process, which can act as unforgeable signatures. While these approaches enhance post-manufacturing assurance, they still face limitations—particularly when it comes to identifying small-scale hardware Trojans subtly embedded within the board.

Looking forward, advancements in automated reverse engineering (RE) tools and techniques hold promise for improving the detection of these threats. By accelerating the deconstruction and analysis of PCBs, RE automation may enable security teams to catch more nuanced attacks, even at the subsystem level. However, for these capabilities to be effective at scale, they must be tightly integrated into the broader lifecycle of electronic systems, from manufacturing through deployment and beyond.

The Next-Gen Defense Arsenal

As counterfeiters adopt increasingly sophisticated concealment methods that evade traditional inspection and test techniques, RE alone may no longer suffice. Effectively addressing hardware-based threats like counterfeiting and Trojan insertion requires a shift from traditional inspection methods to advanced, multidimensional security approaches. Emerging detection technologies are now being developed to enhance inspection accuracy, streamline authentication, and secure the entire electronics supply chain—from chip design to final system integration.

One promising example is optical photon-counting security tagging, which leverages optically encoded QR codes embedded in chips. These can be verified without invasive procedures, offering a scalable, low-cost layer of defense against counterfeiting and hardware Trojans.

Advanced Imaging and Scanning Techniques

Modern imaging tools such as X-ray computed tomography (CT) and electron microscopy offer high-resolution, non-destructive inspection of internal chip structures. These methods enable the identification of subtle, otherwise invisible modifications indicative of hardware Trojans. Recent innovations in ptychography and multi-beam scanning electron microscopes (SEMs) have drastically increased imaging speeds and depth. However, these tools are still expensive and limited in accessibility. Given the enormous datasets these methods generate—potentially petabytes in a single day—there is a growing need for intelligent, automated image analysis tools to streamline reverse engineering and detection workflows.

Cryptographic Signatures and Logic Locking

Another powerful strategy is the use of logic locking, pioneered by researchers at NYU Abu Dhabi. In this technique, chips are embedded with cryptographic keys that lock functionality until proper authentication is provided. These keys are stored in One-Time Programmable (OTP) memory, ensuring that once written, they cannot be changed. Chips such as ARM processors are locked by default and can only be enabled via authorized keys, offering robust protection against cloning, reverse engineering, and unauthorized use.  This design ensures chips remain inoperable without proper authentication, preventing unauthorized usage and rendering reverse engineering ineffective. It represents one of the first provably secure hardware-level protections based on rigorous mathematical definitions and real-world implementations.

Nanoscale Fingerprinting with Crystal Nanoparticles

One emerging solution is nanoscale fingerprinting. Nanoscale material modifications can create optical patterns invisible to the human eye but easily detected with specialized scanners or even mobile cameras.  At the Naval Surface Warfare Center, scientists are embedding crystal nanoparticle arrays into chip materials. These particles reflect light in unique patterns that act as optical fingerprints, verifiable using something as simple as a smartphone camera. This allows on-field authentication without the need for expensive lab equipment. Since the pattern is part of the chip’s physical composition, it is virtually impossible to replicate or alter without detection. These solutions offer lightweight, non-invasive verification—particularly valuable for field-based authentication in military or industrial environments.

AI-Powered Trojan Detection and Side-Channel Monitoring

Artificial intelligence and machine learning are revolutionizing threat detection in hardware. By training models on “golden chip” datasets, AI can identify even the most subtle deviations in behavior. Techniques such as power-side-channel analysis detect variations in power usage that may signal the presence of a Trojan. Thermal imaging can highlight micro-heat signatures generated during Trojan activation. More advanced still, 3D tomography combined with AI correlates internal structural scans with original design schematics, flagging any covert modifications. These AI tools offer significantly higher detection accuracy—up to 98%—and faster analysis than traditional ATPG.

Blockchain-Enabled Supply Chain Provenance

Blockchain technology is being applied to build tamper-proof supply chains. By registering every chip’s manufacturing steps onto a distributed ledger, companies create immutable digital birth records for each component. Smart contracts automatically enforce compliance by verifying that each step follows predefined conditions. At every stage—from wafer to packaging—cryptographic tools ensure that no unverified components slip through. This zero-trust model ensures supply chain visibility and traceability like never before.

Metasurface Holographic Anti-Counterfeiting Tags

Researchers at POSTECH have developed UV-visible metasurface holograms that act as embedded anti-counterfeiting features. These nanostructured tags are built directly into chip packaging and are only visible under ultraviolet light. By layering encrypted product IDs onto subwavelength holographic surfaces, these tags become practically impossible to duplicate. Their integration into integrated circuit (IC) packaging or even official documents like passports creates a visually verifiable layer of protection against fakes.

Here is a refined and concise section to integrate into your blog article under the “Innovative Detection Technologies” segment or as a standalone subsection titled “AI-Photonics Fusion: RAPTOR System for Chip Authentication”:


AI-Photonics Fusion: RAPTOR System for Chip Authentication

In a significant leap forward in counterfeit detection, researchers at Purdue University have developed a novel technique that fuses artificial intelligence (AI) with photonics to authenticate semiconductor chips with unprecedented precision. Their system, called RAPTOR (Residual Attention-Based Processing of Tampering Response), offers a robust solution to the global problem of counterfeit chips—an illicit market valued at over $75 billion.

Traditional chip authentication methods rely on physical unclonable functions (PUFs) or printed security tags, which are vulnerable to environmental degradation or tampering. RAPTOR circumvents these limitations by embedding gold nanoparticles within chip packaging and analyzing the light scattering patterns using dark-field microscopy. These optical “fingerprints” are captured and stored for later comparison.

What sets RAPTOR apart is its use of AI-driven attention mechanisms to detect anomalies in nanoparticle scattering patterns before and after potential tampering. The system can distinguish between natural degradation and intentional tampering, even identifying subtle adversarial alterations aimed at masking chip replacement.

Key performance highlights include:

  • 98% authentication accuracy
  • Verification time under 80 milliseconds
  • 40%+ improvement over traditional detection metrics like Hausdorff and Procrustes algorithms

This innovation not only strengthens security in critical sectors such as defense, finance, and quantum technology but also illustrates the growing potential of deep learning combined with nanophotonics for scalable, non-invasive hardware verification.

Looking ahead, the Purdue team aims to refine nanoparticle embedding techniques and transition RAPTOR into a practical, deployable solution for real-time chip authentication across global semiconductor supply chains.

Sector-Specific Deployments: From Defense to Healthcare

Defense Sector: The Digital Twin Initiative

The U.S. Air Force has invested $7.5 million into creating digital twins of microchips—virtual models that mimic the behavior, lineage, and structure of physical chips. These digital replicas are used to simulate Trojan activation conditions, validate chip provenance, and optimize yield by identifying defects introduced during production.

The Air Force has identified four critical technical focus areas where new solutions are urgently needed:

1. Secure COTS FPGAs

Protecting sensitive information stored and processed in field-programmable gate arrays (FPGAs) sourced from commercial suppliers. These devices, due to their reprogrammable nature, are particularly vulnerable to reverse engineering and tampering.

2. Secure COTS CPI Processing

Securing Critical Program Information (CPI) embedded within complex COTS-based system architectures. As system complexity increases, so does the challenge of ensuring that CPI is protected across all layers of hardware and firmware.

3. Anti-Tamper Secure Microcontrollers

Developing specialized microcontrollers with embedded tamper-resistance features to withstand physical and logical intrusions. These devices must be capable of protecting sensitive instructions and data even under invasive attack scenarios.

4. Volume Protection in COTS Architectures

Implementing multi-layered volume protection methods to safeguard critical data during storage, transmission, and processing—even if the hardware is subjected to unauthorized probing or imaging attempts.

The Vision: Building Entire Secure Architectures

Rather than securing individual components in isolation, the Air Force envisions a holistic security model, whereby entire COTS-based systems are secure by design. Key objectives include:

  • Running Secure FPGA Code: Ensuring that sensitive logic and configurations are protected, both in memory and during execution.

  • Preventing CPI Exploitation: Deploying techniques that prevent unauthorized parties from extracting or modifying critical program data.

  • Enabling Secure System Upgrades: Allowing older, vulnerable systems to be retrofitted with robust, tamper-resistant architectures.

  • Delivering Robust Volume Protection: Incorporating defense-in-depth strategies for data encryption, physical shielding, and active tamper detection mechanisms.


Healthcare Devices: Embedded SiO₂ Nanotags

Pacemaker manufacturers are adopting SiO₂ nanoparticle tags embedded within integrated circuits. These invisible tags enable patients and doctors to verify device authenticity through smartphone apps. If the device is tampered with post-implantation, the tag structure changes, triggering a security alert. This ensures both device integrity and patient safety.

Industrial IoT: Zero-Trust Hardware by Design

Companies like Siemens are implementing Built-In Self-Authentication (BISA) systems in SCADA chips. These systems use otherwise unused chip space to insert authentication circuits that continuously verify the chip’s integrity. Paired with dynamic key cycling, which rotates cryptographic keys every hour, Siemens has established a powerful defense framework suitable for critical infrastructure.

The Road Ahead: Building a Unified Front

No single technology can counter the evolving landscape of counterfeit electronics and hardware Trojans. The most effective approach will be a layered, adaptive security strategy that encompasses every phase of a chip’s lifecycle. Pre-silicon tools like logic locking and formal verification ensure clean designs. Physical authenticity checks, such as metasurface holograms and nanoscale fingerprints, add layers of post-fabrication security. Meanwhile, AI-powered tools can continuously monitor chips during deployment, flagging anomalies in real time.

Solutions like Systech’s UniSecure® show that even barcodes can become digital fingerprints, enhancing authenticity without altering existing packaging. Industry-wide consortia such as the IOWN Global Forum are now collaborating to define open security frameworks for future networked systems.

“The next world war may begin not with missiles, but with compromised microchips.”
U.S. Space Force Counter-Intelligence Directive 2025


Conclusion: Securing the Foundation

Hardware security is no longer just a technical challenge—it is a geopolitical imperative. As technology continues to advance, so too do the techniques used by malicious actors to infiltrate and compromise critical systems. From counterfeit electronic components to stealthy hardware Trojans, the threats are sophisticated, global, and persistent.

The integrity of global infrastructure, national defense, and personal safety all hinge on trustworthy electronics. From nanoparticle-based authentication and AI-powered anomaly detection to blockchain-led supply chain traceability, we now possess a powerful arsenal to combat the invisible threats within our circuits.

But these solutions must move beyond labs and pilots. Their effectiveness depends on widespread adoption and cross-sector collaboration guided by three principles: provenance transparency, zero-trust verification, and adaptive resilience. Only by embracing these principles can we secure the silicon that powers the modern world—and ensure it remains a force for progress, not sabotage.

The light-speed age deserves hardware we can trust.

 

 

 

 

 

 

Air Force Seeks Industry Solutions for Secure Weapon Systems: A Call for Anti-Tamper Innovation

The U.S. Air Force is on the hunt for cutting-edge anti-tamper technologies to safeguard their weapon systems from malicious actors. They’re calling on industry to develop solutions that address four key vulnerabilities:

  • Secure COTS FPGAs: Protecting the sensitive information stored and processed by commercial off-the-shelf field-programmable gate arrays used in weapon systems.
  • Secure COTS CPI Processing: Ensuring the security of critical program information within complex architectures built from readily available COTS components.
  • Anti-Tamper Secure Microcontrollers: Creating specialized microcontrollers with built-in tamper-proofing mechanisms for enhanced security.
  • Volume Protection within COTS Architectures: Implementing innovative methods to shield critical information within standard COTS hardware, even during attempted unauthorized access.

The goal is not just to build individual secure components, but to create entire secure architectures. They envision COTS-based systems that:

  • Run secure FPGA software: Protecting sensitive information both when stored and when actively running on FPGAs.
  • Prevent CPI exploitation: Thwarting attempts to extract critical information from systems built with commercial parts.
  • Enable secure upgrades: Upgrading existing unsecure systems to more robust and tamper-proof versions.
  • Offer robust volume protection: Implementing novel, multi-layered safeguards to shield classified information within COTS hardware architectures.

Collaborative Industry Efforts: Establishing collaborative efforts within industries to share information about known threats and vulnerabilities can create a collective defense against counterfeit components and Hardware Trojans. Information sharing enables quicker identification and mitigation of risks.

Systech Launches a Breakthrough in Product Security

Systech, a leading provider of digital identification and traceability software solutions, has introduced the latest version of its UniSecure® platform, a comprehensive product security solution designed for counterfeit and diversion detection across diverse markets, including pharmaceuticals and skincare. The upgraded UniSecure leverages Systech’s patented e-Fingerprint® technology, enabling secure authentication without altering existing packaging. By transforming barcodes such as 1D, 2D Data Matrix, or QR codes into covert digital signatures, UniSecure ensures unique product identification, traceability, and verification via smartphones throughout the supply chain. The platform’s non-additive and covert nature, compatibility with existing packaging, and real-time alerts for counterfeiting threats enhance its effectiveness, with additional features such as GS1-compliant high-density QR codes and artificial intelligence-enabled mobile applications for optimal accuracy during product verification.

UniSecure’s key technological features include its patented e-Fingerprint® approach, generating non-replicable digital signatures from packaging barcodes. The platform facilitates rapid deployment on production lines with minimal downtime and direct cloud connectivity. It offers real-time alerts for potential threats, comprehensive forensic intelligence tools for root cause analysis, and the ability to showcase extensive product and brand information using GS1-compliant high-density QR codes. The upgrade aligns with recent advancements in Artificial Intelligence, Cloud, and Machine Vision technologies, emphasizing Systech’s commitment to delivering transformative solutions for brand protection against counterfeiting and diversion in the global marketplace.

Conclusion

As technology continues to advance, so do the methods employed by malicious actors to compromise electronic systems. Safeguarding against the threat of counterfeit electronic components and Hardware Trojans requires a concerted effort from manufacturers, regulatory bodies, and technology innovators. By embracing cutting-edge detection technologies and fostering collaboration within industries, we can build a robust defense to ensure the integrity and security of our digital infrastructure in the face of evolving threats.

 

 

References and Resources also include:

https://www.smithsonianmag.com/smithsonian-institution/how-nanoscale-signatures-could-keep-counterfeit-parts-out-military-equipment-180972206/

https://www.albawaba.com/business/pr/researchers-nyu-abu-dhabi-develop-breakthrough-computer-chip-security-technology-1011644

file:///C:/Users/Dell/Downloads/BAA-AFLCMCXZZ-2016-001%20Call%204.pdf

https://www.eetimes.com/military-enlists-digital-twin-technology-to-secure-chips/#

https://www.photonics.com/Articles/Metasurface_and_UV_and_Visible_Light_System/a67890

https://www.prnewswire.com/news-releases/systech-launches-a-breakthrough-in-product-security-301981884.html

 

About Rajesh Uppal

Check Also

Quantum Computing Threatens Digital Security: NIST’s Race to Standardize Post-Quantum Cryptography

The cryptographic apocalypse is no longer a theoretical concept. With quantum computers approaching the threshold …

wpChatIcon
wpChatIcon