
Sign up to save your podcasts
Or


John McMaster (@johndmcmaster) told us about the process of opening up chips to see how the processors are structured and what the firmware says.
See John's website for information on getting started (as well as digging much deeper).
John has given some interesting Hardwear.io talks including Capturing Mask ROMs and Taming Hydrofluoric Acid to Extract Firmware. His talks and many others are available on the Hardwear.io archive. Or sign up for the Hardwear.io Online Hardware Security Training, Berlin Jan 2021.
As mentioned in the show:
John wrote a blog post about his top lab accidents and explosions.
Paper: Reverse engineering Flash EEPROM memories using Scanning Electron Microscopy by Franck Courbon, Sergei Skorobogatov, and Christopher Woods
Rompar and bitract are the two programs mentioned as helpful for getting from an image to binary code.
By Logical Elegance4.8
187187 ratings
John McMaster (@johndmcmaster) told us about the process of opening up chips to see how the processors are structured and what the firmware says.
See John's website for information on getting started (as well as digging much deeper).
John has given some interesting Hardwear.io talks including Capturing Mask ROMs and Taming Hydrofluoric Acid to Extract Firmware. His talks and many others are available on the Hardwear.io archive. Or sign up for the Hardwear.io Online Hardware Security Training, Berlin Jan 2021.
As mentioned in the show:
John wrote a blog post about his top lab accidents and explosions.
Paper: Reverse engineering Flash EEPROM memories using Scanning Electron Microscopy by Franck Courbon, Sergei Skorobogatov, and Christopher Woods
Rompar and bitract are the two programs mentioned as helpful for getting from an image to binary code.

43,981 Listeners

32,134 Listeners

30,672 Listeners

384 Listeners

292 Listeners

625 Listeners

585 Listeners

232 Listeners

214 Listeners

164 Listeners

40 Listeners

9,514 Listeners

189 Listeners

141 Listeners

60 Listeners