YoVDO

Unlocking Hardware Security - Red Team, Blue Team, and Trojan Tales

Offered By: media.ccc.de via YouTube

Tags

Hardware Security Courses Reverse Engineering Courses Image Processing Courses Integrated Circuits Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk on hardware security, focusing on detecting malicious hardware Trojans in Integrated Circuits (ICs). Delve into the importance of IC integrity for secure electronic devices and learn about imaging techniques used to compare manufactured chips with original designs. Discover a unique Red Team vs. Blue Team case study involving four digital ICs in various modern feature sizes. Gain insights into the IC design and production process, common hardware Trojan attacks, and open-source image processing techniques for reverse engineering chips. Witness a live demonstration of Trojan detection and learn about the challenges and successes in uncovering hidden manipulations. Access shared source code and image datasets to contribute to ongoing research in hardware security. Understand the impact of technology scaling on detection performance and explore ways to make IC reverse engineering more accessible to a wider audience.

Syllabus

37C3 - Unlocking Hardware Security: Red Team, Blue Team, and Trojan Tales


Taught by

media.ccc.de

Related Courses

Introduction to Artificial Intelligence
Stanford University via Udacity
Computer Vision: The Fundamentals
University of California, Berkeley via Coursera
Computational Photography
Georgia Institute of Technology via Coursera
Digital Signal Processing
École Polytechnique Fédérale de Lausanne via Coursera
Creative, Serious and Playful Science of Android Apps
University of Illinois at Urbana-Champaign via Coursera