YoVDO

Unlocking Hardware Security - Red Team, Blue Team, and Trojan Tales

Offered By: media.ccc.de via YouTube

Tags

Hardware Security Courses Reverse Engineering Courses Image Processing Courses Integrated Circuits Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk on hardware security, focusing on detecting malicious hardware Trojans in Integrated Circuits (ICs). Delve into the importance of IC integrity for secure electronic devices and learn about imaging techniques used to compare manufactured chips with original designs. Discover a unique Red Team vs. Blue Team case study involving four digital ICs in various modern feature sizes. Gain insights into the IC design and production process, common hardware Trojan attacks, and open-source image processing techniques for reverse engineering chips. Witness a live demonstration of Trojan detection and learn about the challenges and successes in uncovering hidden manipulations. Access shared source code and image datasets to contribute to ongoing research in hardware security. Understand the impact of technology scaling on detection performance and explore ways to make IC reverse engineering more accessible to a wider audience.

Syllabus

37C3 - Unlocking Hardware Security: Red Team, Blue Team, and Trojan Tales


Taught by

media.ccc.de

Related Courses

Systems & Network Security
Chaffey College via California Community Colleges System
Physical and Advanced Side-Channel Attacks
Graz University of Technology via edX
Developing Secure IoT Applications
EDUCBA via Coursera
Essential Aspects of Software, Hardware, and Data Backup
Microsoft via Coursera
Cybersecurity
University of Maryland, College Park via Coursera