Shield your Microelectronics from Cyberattacks
End-to-End Microelectronics Security from Simulation to Silicon.

Resources on
Data Management
Increasing IJTAG Bandwidth and Managing Security through Parallel Locking-SIBs
Increasing IJTAG Bandwidth and Managing Security through Parallel Locking-SIBs
Making it Harder to Unlock an LSIB: Honeytraps and Misdirection in a P1687 Network
Making it Harder to Unlock LSIB: Honeytraps and Misdirection in a P1687 Network
White Paper on Microelectronics Supply Chain Security
White Paper on Microelectronics Supply Chain Security