Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Last revisionBoth sides next revision
resources [2013/10/17 04:22] mcmasterresources [2013/10/17 04:30] mcmaster
Line 1: Line 1:
-====== Papers ====== +====== Papers and books ====== 
  
 ===== Semi-invasive attacks - A new approach to hardware security analysis ===== ===== Semi-invasive attacks - A new approach to hardware security analysis =====
Line 38: Line 38:
 Class with some web resources on how to convert logic gates to silicon masks Class with some web resources on how to convert logic gates to silicon masks
  
-==== Texplained: Hardware Reverse-engineering Tools new threats - new oppertunities ====+===== Texplained: Hardware Reverse-engineering Tools new threats - new oppertunities =====
  
 Olivier Thomas Olivier Thomas
  
 http://recon.cx/2013/slides/Recon2013-Olivier%20Thomas-Hardware%20reverse%20engineering%20tools.pdf http://recon.cx/2013/slides/Recon2013-Olivier%20Thomas-Hardware%20reverse%20engineering%20tools.pdf
 +
 +===== Backside IC analysis =====
 +
 +Dmitry Nedospasov
 +
 +http://sandiego.toorcon.net/2013/10/07/backside-ic-analysis/
  
  
 
resources.txt · Last modified: 2013/10/20 14:59 by 127.0.0.1
 
Except where otherwise noted, content on this wiki is licensed under the following license: CC Attribution 4.0 International
Recent changes RSS feed Donate Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki