Explore the discrepancies between theoretical security models and real-world vulnerabilities in this 15-minute IEEE presentation. Delve into the t-Probing Security Model, laser logic state imaging, and EOFM CMOS techniques. Learn about attack approaches on configurable logic, image extraction methods, and their implications. Gain insights into the latest findings that challenge established security theories and understand their potential impact on future cybersecurity practices.
Overview
Syllabus
Introduction
Outline
Background Knowledge
Deep Probing Security Model
Laser Logic State Imaging
EOFM
CMOS
Attack Approach
Configurable Logic
Image Extraction
Results
Conclusion
Taught by
IEEE Symposium on Security and Privacy