Which access control policies, if any, can address software induced hardware Trojans?
- Describe an encryption method that is ideal for securing data in a DfD structure with cost-effective area overhead, and key management.
- An attacker uses the same trigger condition from the Trojan in Question 3 Short Answer, to toggle the secure mode flag in a microprocessor with a trusted execution environment (TEE). Assess this Trojan using the DREAD method.