Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk on hardware security, focusing on detecting malicious hardware Trojans in Integrated Circuits (ICs). Delve into the importance of IC integrity for secure electronic devices and learn about imaging techniques used to compare manufactured chips with original designs. Discover a unique Red Team vs. Blue Team case study involving four digital ICs in various modern feature sizes. Gain insights into the IC design and production process, common hardware Trojan attacks, and open-source image processing techniques for reverse engineering chips. Witness a live demonstration of Trojan detection and learn about the challenges and successes in uncovering hidden manipulations. Access shared source code and image datasets to contribute to ongoing research in hardware security. Understand the impact of technology scaling on detection performance and explore ways to make IC reverse engineering more accessible to a wider audience.
Syllabus
37C3 - Unlocking Hardware Security: Red Team, Blue Team, and Trojan Tales
Taught by
media.ccc.de