Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
resources [2013/10/17 04:22] – [Texplained: Hardware Reverse-engineering Tools new threats - new oppertunities] mcmasterresources [2013/10/20 14:59] (current) – external edit 127.0.0.1
Line 1: Line 1:
-====== Papers ====== +====== Papers and books ====== 
  
 ===== Semi-invasive attacks - A new approach to hardware security analysis ===== ===== Semi-invasive attacks - A new approach to hardware security analysis =====
Line 43: Line 43:
  
 http://recon.cx/2013/slides/Recon2013-Olivier%20Thomas-Hardware%20reverse%20engineering%20tools.pdf http://recon.cx/2013/slides/Recon2013-Olivier%20Thomas-Hardware%20reverse%20engineering%20tools.pdf
 +
 +===== Backside IC analysis =====
 +
 +Dmitry Nedospasov
 +
 +http://sandiego.toorcon.net/2013/10/07/backside-ic-analysis/
  
  
 
resources.1381983755.txt.gz · Last modified: 2013/10/20 14:59 (external edit)
 
Except where otherwise noted, content on this wiki is licensed under the following license: CC Attribution 4.0 International
Recent changes RSS feed Donate Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki