Thank you.
I like this paper, because its tied into the world of real semiconductor
processing and diagnostic machines. The understanding of defenses and
attacks against silicon requires an understanding of the capability of
these machines and their use.
What makes passive voltage contrast imaging good for detecting Becker
style trojans is also what makes it a tool for side channel analysis and
so as with other areas of hardware crypto engineering, knowing the tools
of the enemy is a prerequisite to knowing what defenses are effective
and what defenses are not.
DJ
On 7/1/14, 5:31 PM, Tony Arcieri wrote:
This went to the cypherpunks list, but not to the others:
http://eprint.iacr.org/2014/508
Reversing stealthy dopant level trojans!
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography