Unlocking Hardware Security - Red Team, Blue Team, and Trojan Tales
Offered By: media.ccc.de via YouTube
Course Description
Overview
Explore a comprehensive conference talk on hardware security, focusing on detecting malicious hardware Trojans in Integrated Circuits (ICs). Delve into the importance of IC integrity for secure electronic devices and learn about imaging techniques used to compare manufactured chips with original designs. Discover a unique Red Team vs. Blue Team case study involving four digital ICs in various modern feature sizes. Gain insights into the IC design and production process, common hardware Trojan attacks, and open-source image processing techniques for reverse engineering chips. Witness a live demonstration of Trojan detection and learn about the challenges and successes in uncovering hidden manipulations. Access shared source code and image datasets to contribute to ongoing research in hardware security. Understand the impact of technology scaling on detection performance and explore ways to make IC reverse engineering more accessible to a wider audience.
Syllabus
37C3 - Unlocking Hardware Security: Red Team, Blue Team, and Trojan Tales
Taught by
media.ccc.de
Related Courses
Introduction to Artificial IntelligenceStanford University via Udacity Computer Vision: The Fundamentals
University of California, Berkeley via Coursera Computational Photography
Georgia Institute of Technology via Coursera Digital Signal Processing
École Polytechnique Fédérale de Lausanne via Coursera Creative, Serious and Playful Science of Android Apps
University of Illinois at Urbana-Champaign via Coursera