How can overclocking and undervolting lead to a CLKSCREW attack?
- Which phase of SoC Verification can be used to detect side-channel attacks. Why?
- Instead of the centralized policy engine described earlier, a designer decides to implement distributed policy enforcement (relevant security policies are described in the corresponding IP instead of a centralized engine). Describe two advantages of a centralized policy engine over a distributed one, and vice versa.