User Tools

Site Tools


resources

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
resources [2012/02/20 08:55] mcmasterresources [2013/10/20 14:59] (current) – external edit 127.0.0.1
Line 1: Line 1:
-====== Papers ====== +====== Papers and books ====== 
  
-====== Semi-invasive attacks - A new approach to hardware security analysis ====== +===== Semi-invasive attacks - A new approach to hardware security analysis =====
   * Sergei P. Skorobogatov   * Sergei P. Skorobogatov
   * University of Cambridge   * University of Cambridge
Line 8: Line 8:
 Detailed overview of the entire process. Highly recommended. Detailed overview of the entire process. Highly recommended.
  
-====== The State-of-the-Art in IC Reverse Engineering ====== +===== The State-of-the-Art in IC Reverse Engineering =====
 http://www.springerlink.com/content/w8568j6533634w74/fulltext.pdf http://www.springerlink.com/content/w8568j6533634w74/fulltext.pdf
  
 Has some history and current techniques. Has some history and current techniques.
  
-====== Reverse Engineering Complex Application Specific Integrated Circuits (ASICs) ====== +===== Reverse Engineering Complex Application Specific Integrated Circuits (ASICs) =====
 http://www.gemes.com/company_info/reverse_engineering_complex_ASICS.pdf http://www.gemes.com/company_info/reverse_engineering_complex_ASICS.pdf
  
 Basic overview of IC RE process Basic overview of IC RE process
  
-====== Integrated circuit failure analysis: a guide to preparation techniques ====== +===== Integrated circuit failure analysis: a guide to preparation techniques =====
   * part of failure analysis, chips must be decapped. Provides industrial grade walkthrough of how to decap chips   * part of failure analysis, chips must be decapped. Provides industrial grade walkthrough of how to decap chips
   * ISBN-10: 0471974013   * ISBN-10: 0471974013
   * ISBN-13: 978-0471974017   * ISBN-13: 978-0471974017
  
-====== Building a High-Performance, Programmable Secure Coprocessor ====== +===== Building a High-Performance, Programmable Secure Coprocessor =====
 http://www.research.ibm.com/secure_systems_department/projects/scop/papers/arch.pdf http://www.research.ibm.com/secure_systems_department/projects/scop/papers/arch.pdf
  
-====== Presentations ====== +====== Presentations ======
  
-====== 25C3 IC Reverse Engineering ====== +===== 25C3 IC Reverse Engineering =====
 Karsten Nohl Karsten Nohl
  
 http://events.ccc.de/congress/2008/Fahrplan/events/2896.en.html http://events.ccc.de/congress/2008/Fahrplan/events/2896.en.html
  
-====== VLSI CAD: Logic to layout ====== +===== VLSI CAD: Logic to layout =====
 http://www.ece.cmu.edu/~ee760/ http://www.ece.cmu.edu/~ee760/
  
 Class with some web resources on how to convert logic gates to silicon masks Class with some web resources on how to convert logic gates to silicon masks
 +
 +===== Texplained: Hardware Reverse-engineering Tools new threats - new oppertunities =====
 +
 +Olivier Thomas
 +
 +http://recon.cx/2013/slides/Recon2013-Olivier%20Thomas-Hardware%20reverse%20engineering%20tools.pdf
 +
 +===== Backside IC analysis =====
 +
 +Dmitry Nedospasov
 +
 +http://sandiego.toorcon.net/2013/10/07/backside-ic-analysis/
 +
  
 ====== Blog ======  ====== Blog ====== 
resources.1329728136.txt.gz · Last modified: 2013/10/20 14:59 (external edit)