Describe the lifecycle of a modern electronic hardware / ASIC design.
1. Classify the attacks on hardware IPs in terms of the attacker’s origin and intent. Briefly describe possible attack instances of hardware Trojan and IC overproduction.
2. How can an IP be exploited via reverse engineering? Briefly explain potential attack instances of reverse engineering.
3. Describe the typical development lifecycle of an FPGA-based product.