This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
resources [2013/10/17 04:22] – [Texplained: Hardware Reverse-engineering Tools new threats - new oppertunities] mcmaster | resources [2013/10/17 04:23] – [Papers] mcmaster | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Papers ====== | + | ====== Papers |
===== Semi-invasive attacks - A new approach to hardware security analysis ===== | ===== Semi-invasive attacks - A new approach to hardware security analysis ===== |