You have designed new IC chip and have sent specification to Nano lab for fabrication.
You are ready to install 10000 IC chips in your new IoT product that you will sell around the World. After studying “Security in Embedded Systems” class you are aware of “Hardware Trojans”.
What kind of malicious actions a hardware Trojan can perform on IC? (provide at least 4).
How can you detect hardware Trojan in your IC chip? Can you use side channel attacks?