
Sign up to save your podcasts
Or


John McMaster (@johndmcmaster) told us about the process of opening up chips to see how the processors are structured and what the firmware says.
See John's website for information on getting started (as well as digging much deeper).
John has given some interesting Hardwear.io talks including Capturing Mask ROMs and Taming Hydrofluoric Acid to Extract Firmware. His talks and many others are available on the Hardwear.io archive. Or sign up for the Hardwear.io Online Hardware Security Training, Berlin Jan 2021.
As mentioned in the show:
John wrote a blog post about his top lab accidents and explosions.
Paper: Reverse engineering Flash EEPROM memories using Scanning Electron Microscopy by Franck Courbon, Sergei Skorobogatov, and Christopher Woods
Rompar and bitract are the two programs mentioned as helpful for getting from an image to binary code.
By Logical Elegance4.8
188188 ratings
John McMaster (@johndmcmaster) told us about the process of opening up chips to see how the processors are structured and what the firmware says.
See John's website for information on getting started (as well as digging much deeper).
John has given some interesting Hardwear.io talks including Capturing Mask ROMs and Taming Hydrofluoric Acid to Extract Firmware. His talks and many others are available on the Hardwear.io archive. Or sign up for the Hardwear.io Online Hardware Security Training, Berlin Jan 2021.
As mentioned in the show:
John wrote a blog post about his top lab accidents and explosions.
Paper: Reverse engineering Flash EEPROM memories using Scanning Electron Microscopy by Franck Courbon, Sergei Skorobogatov, and Christopher Woods
Rompar and bitract are the two programs mentioned as helpful for getting from an image to binary code.

272 Listeners

382 Listeners

290 Listeners

623 Listeners

268 Listeners

584 Listeners

231 Listeners

70 Listeners

987 Listeners

40 Listeners

8,064 Listeners

189 Listeners

63 Listeners

141 Listeners

66 Listeners