Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore techniques for defeating ROM encryption systems in this 36-minute conference talk from REcon 2019. Discover how visual patterns in ROM data extracted using microscopes can provide clues for decryption. Learn about software tools developed for analyzing and processing extracted ROM bits, with a focus on a specific family of smartcard chips. Gain insights into how information from previously hacked devices can be leveraged to break the security of other systems, even across different markets and customers. Understand the principles and techniques that have been successfully employed to decrypt ROM contents from various chips, highlighting the vulnerabilities in seemingly secure ROM encryption designs.