Overview
Explore advanced integrated circuit reverse engineering techniques through an in-depth analysis of a modern smart card used in the pay TV industry. Delve into the complex world of hardware attacks and countermeasures, focusing on a case study of a widely-used pay TV smartcard that has remained uncompromised for over five years. Learn about the tools and techniques necessary for successful analysis of custom hardware functions, including full extraction and analysis of the device's netlist. Discover how advanced analysis techniques can significantly reduce study time from months to weeks. Cover topics such as failure analysis, imagery, feature extraction, core reading, attack strategies for flash and ROM reading, RAM block analysis, and timing generation benchmarks. Gain insights into the evolution of hardware security, threat globalization, and the importance of understanding these advanced techniques in the context of modern cybersecurity challenges.
Syllabus
Intro
About Texplained
Overview
Background
Evolution
Threat globalisation
Approach
Failure Analysis - Process Choices
Imagery
Feature Extraction
Reading The Core
Attack Strategy For Reading The Flash
Reading The ROM
2 Blocs of RAM
Timing: generation benchmark
Conclusion -The Target
Conclusion - The Process
Taught by
Black Hat