Assume this is my chip.
It has my intellectual property, it has my secret data.
And, the attackers want to launch what we have discussed the physical attacks to
the, to the chip.
Trying to either reveal my design details or
trying to steal the secret data stored in the system.
And we have learned the different physical attacks, starting from
the invasive attack, semi-invasive attack, or non-invasive, invasive attacks.
And the two of the most, I mean, powerful attacks, they are reverse engineering and
search channel analysis attacks.
So these attacks they'll be able to to they'll be, I mean, be able peel of
the chip layer by layer trying to figure out what is in the structure of the chip,
and then trying to find out the functionality of my design.
Or it can go through set channel, trying to analyse and then steal the data.