This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionLast revisionBoth sides next revision | ||
resources [2013/01/22 05:38] – external edit 127.0.0.1 | resources [2013/10/17 04:30] – mcmaster | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Papers ====== | + | ====== Papers |
===== Semi-invasive attacks - A new approach to hardware security analysis ===== | ===== Semi-invasive attacks - A new approach to hardware security analysis ===== | ||
Line 37: | Line 37: | ||
Class with some web resources on how to convert logic gates to silicon masks | Class with some web resources on how to convert logic gates to silicon masks | ||
+ | |||
+ | ===== Texplained: Hardware Reverse-engineering Tools new threats - new oppertunities ===== | ||
+ | |||
+ | Olivier Thomas | ||
+ | |||
+ | http:// | ||
+ | |||
+ | ===== Backside IC analysis ===== | ||
+ | |||
+ | Dmitry Nedospasov | ||
+ | |||
+ | http:// | ||
+ | |||
====== Blog ====== | ====== Blog ====== |