Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Last revisionBoth sides next revision
resources [2013/01/22 05:38] – external edit 127.0.0.1resources [2013/10/17 04:30] mcmaster
Line 1: Line 1:
-====== Papers ====== +====== Papers and books ====== 
  
 ===== Semi-invasive attacks - A new approach to hardware security analysis ===== ===== Semi-invasive attacks - A new approach to hardware security analysis =====
Line 37: Line 37:
  
 Class with some web resources on how to convert logic gates to silicon masks Class with some web resources on how to convert logic gates to silicon masks
 +
 +===== Texplained: Hardware Reverse-engineering Tools new threats - new oppertunities =====
 +
 +Olivier Thomas
 +
 +http://recon.cx/2013/slides/Recon2013-Olivier%20Thomas-Hardware%20reverse%20engineering%20tools.pdf
 +
 +===== Backside IC analysis =====
 +
 +Dmitry Nedospasov
 +
 +http://sandiego.toorcon.net/2013/10/07/backside-ic-analysis/
 +
  
 ====== Blog ======  ====== Blog ====== 
 
resources.txt · Last modified: 2013/10/20 14:59 by 127.0.0.1
 
Except where otherwise noted, content on this wiki is licensed under the following license: CC Attribution 4.0 International
Recent changes RSS feed Donate Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki