Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Unlocking Hardware Security - Red Team, Blue Team, and Trojan Tales

media.ccc.de via YouTube

Overview

Explore a comprehensive conference talk on hardware security, focusing on detecting malicious hardware Trojans in Integrated Circuits (ICs). Delve into the importance of IC integrity for secure electronic devices and learn about imaging techniques used to compare manufactured chips with original designs. Discover a unique Red Team vs. Blue Team case study involving four digital ICs in various modern feature sizes. Gain insights into the IC design and production process, common hardware Trojan attacks, and open-source image processing techniques for reverse engineering chips. Witness a live demonstration of Trojan detection and learn about the challenges and successes in uncovering hidden manipulations. Access shared source code and image datasets to contribute to ongoing research in hardware security. Understand the impact of technology scaling on detection performance and explore ways to make IC reverse engineering more accessible to a wider audience.

Syllabus

37C3 - Unlocking Hardware Security: Red Team, Blue Team, and Trojan Tales

Taught by

media.ccc.de

Reviews

Start your review of Unlocking Hardware Security - Red Team, Blue Team, and Trojan Tales

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.