Chapter 15

PCB Authentication and Integrity Validation

Abstract

Due to the distributed nature of PCB design, manufacturing, and distribution process, recycled, cloned, and overproduced PCBs can easily infiltrate the supply chain. To mitigate these threats, PCB authentication techniques can be used to help distinguish original PCBs from the counterfeit ones. Malicious alteration of PCBs in the field is also a serious security concern as it enables an attacker to bypass restrictions imposed by the original equipment manufacturers. An intelligent form of tampering could lead to an unauthorized use of the system, leakage of secret information, and extraction of an IP (such as designs and algorithms). In this chapter, we discuss various methods ...

Get Hardware Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.