
Vulnerability Prioritization In The Real World - Andy Jaquith - PSW #858
Paul's Security Weekly (Audio)
00:00
Challenges in Detecting Hardware Security Threats
This chapter explores the challenges in detecting hardware trojans and the complexities of hardware security analysis. It emphasizes the role of software in leveraging malicious hardware and the limitations of current detection methods, especially when sourcing from rival nations.
Transcript
Play full episode