And the next one is the cloning attack, where after the reverse engineering.
The illegal users, they are trying to fabricate, or
trying to use the reverse exchange configuration bit
stream file to configure FPG chips, and this is what we call the clonal attack.
And we have talked about the digital watermarking and
digital fingerprint techniques to determine such an attack.
Because you have your watermark trying to prove that this is your design.
Even after they clone it, you can prove it is yours, or once you put a fingerprint,
you can tell who has done this since illegally trying to clone the chip.
And also, there are some risks to the work trying to bind.
The chip, the FPGA chip with encryption or with silicon path.
And the next one is side channel attacks.
So there have been a lot of reported successful attacks from the power channel,
from the timing channel, or from the electromagnetic,
emission channel trying to leak information from the FPGA chip.
And, the most of the passive the techniques against the passive attacks we
have discussed earlier.
Can be applied for FPG and base the system against a side channel attacks.