Thank you.

I like this paper, because its tied into the world of real semiconductor processing and diagnostic machines. The understanding of defenses and attacks against silicon requires an understanding of the capability of these machines and their use.

What makes passive voltage contrast imaging good for detecting Becker style trojans is also what makes it a tool for side channel analysis and so as with other areas of hardware crypto engineering, knowing the tools of the enemy is a prerequisite to knowing what defenses are effective and what defenses are not.

DJ


On 7/1/14, 5:31 PM, Tony Arcieri wrote:
This went to the cypherpunks list, but not to the others:

http://eprint.iacr.org/2014/508

Reversing stealthy dopant level trojans!


_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to