User Tools

Site Tools


resources

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
resources [2013/10/17 04:22] – [Texplained: Hardware Reverse-engineering Tools new threats - new oppertunities] mcmasterresources [2013/10/20 14:59] (current) – external edit 127.0.0.1
Line 1: Line 1:
-====== Papers ====== +====== Papers and books ====== 
  
 ===== Semi-invasive attacks - A new approach to hardware security analysis ===== ===== Semi-invasive attacks - A new approach to hardware security analysis =====
Line 43: Line 43:
  
 http://recon.cx/2013/slides/Recon2013-Olivier%20Thomas-Hardware%20reverse%20engineering%20tools.pdf http://recon.cx/2013/slides/Recon2013-Olivier%20Thomas-Hardware%20reverse%20engineering%20tools.pdf
 +
 +===== Backside IC analysis =====
 +
 +Dmitry Nedospasov
 +
 +http://sandiego.toorcon.net/2013/10/07/backside-ic-analysis/
  
  
resources.1381983755.txt.gz · Last modified: 2013/10/20 14:59 (external edit)