Hardware Trust and Counterfeiting
We present new tamper-proof methods that can make it extremely difficult for an adversary to modify or insert malicious circuitry into the circuit. Our approach fuses two modes of operation via an embedded code-word that is integrated with the transition function. This results in a significantly higher level of protection against tamper. We also present a time-stamp circuitry to prevent counterfeiting. Finally, new methods to detect any inserted hardware Trojan will be presented.