Webinar: How to Steal AI Algorithms at the Edge and Protect Them

August 6, 2025

Learn about what applications are vulnerable to microelectronics attacks, methods and risks of microelectronics tampering, such as side channel and beam attacks, why commercial security engineering limitations can lead to national security threats, and hear from industry, government, and academic experts about how to protect AI algorithms and microelectronics systems.

Discover:

  • How your IP, Ai tech, data, and sensors aren’t as safe as you think
  • Commercial and defense applications that can be at risk: Tesla and MQ9
  • Why trust and assurance are more than just domestic manufacturing
  • Microelectronics tampering methods: imaging, SCA, beam attacks, delayering, probing, and more
  • Risks of microelectronics tampering methods
  • Limitations of commercial security engineering and how corporate espionage can become a national security threat
  • What secure microelectronics are and how Mercury is ensuring their resiliency 

No Previous Videos

Next Video
Battlefield Ahead: How Direct RF Will Shape the Future of Electronic Warfare
Battlefield Ahead: How Direct RF Will Shape the Future of Electronic Warfare

This Electronic Engineering Journal's Fish Fry podcast episode is all about direct RF, the critical needs f...