Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Last revisionBoth sides next revision
resources [2013/10/17 04:22] – [Texplained: Hardware Reverse-engineering Tools new threats - new oppertunities] mcmasterresources [2013/10/17 04:30] mcmaster
Line 1: Line 1:
-====== Papers ====== +====== Papers and books ====== 
  
 ===== Semi-invasive attacks - A new approach to hardware security analysis ===== ===== Semi-invasive attacks - A new approach to hardware security analysis =====
Line 43: Line 43:
  
 http://recon.cx/2013/slides/Recon2013-Olivier%20Thomas-Hardware%20reverse%20engineering%20tools.pdf http://recon.cx/2013/slides/Recon2013-Olivier%20Thomas-Hardware%20reverse%20engineering%20tools.pdf
 +
 +===== Backside IC analysis =====
 +
 +Dmitry Nedospasov
 +
 +http://sandiego.toorcon.net/2013/10/07/backside-ic-analysis/
  
  
 
resources.txt · Last modified: 2013/10/20 14:59 by 127.0.0.1
 
Except where otherwise noted, content on this wiki is licensed under the following license: CC Attribution 4.0 International
Recent changes RSS feed Donate Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki