Hardware Security, Vulnerabilities, and Attacks: A Comprehensive Taxonomy
System security, but this is not the only role that hardware plays in its security. We can, in fact, identify three di erent areas to consider, as shown in Figure2: Hardware Security, Hardware-based Security, and Hardware Trust. Hardware Security refers to all the actions needed to (i) identify hardware vulnerabilities, (ii)