resources
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| resources [2012/02/20 08:56] – mcmaster | resources [2025/08/04 21:23] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== Papers ====== | + | ====== Papers |
| ===== Semi-invasive attacks - A new approach to hardware security analysis ===== | ===== Semi-invasive attacks - A new approach to hardware security analysis ===== | ||
| Line 37: | Line 37: | ||
| Class with some web resources on how to convert logic gates to silicon masks | Class with some web resources on how to convert logic gates to silicon masks | ||
| + | |||
| + | ===== Texplained: Hardware Reverse-engineering Tools new threats - new oppertunities ===== | ||
| + | |||
| + | Olivier Thomas | ||
| + | |||
| + | http:// | ||
| + | |||
| + | ===== Backside IC analysis ===== | ||
| + | |||
| + | Dmitry Nedospasov | ||
| + | |||
| + | http:// | ||
| + | |||
| ====== Blog ====== | ====== Blog ====== | ||
resources.1329728174.txt.gz · Last modified: 2013/10/20 14:59 (external edit)
