
Sign up to save your podcasts
Or


John McMaster (@johndmcmaster) told us about the process of opening up chips to see how the processors are structured and what the firmware says.
See John's website for information on getting started (as well as digging much deeper).
John has given some interesting Hardwear.io talks including Capturing Mask ROMs and Taming Hydrofluoric Acid to Extract Firmware. His talks and many others are available on the Hardwear.io archive. Or sign up for the Hardwear.io Online Hardware Security Training, Berlin Jan 2021.
As mentioned in the show:
John wrote a blog post about his top lab accidents and explosions.
Paper: Reverse engineering Flash EEPROM memories using Scanning Electron Microscopy by Franck Courbon, Sergei Skorobogatov, and Christopher Woods
Rompar and bitract are the two programs mentioned as helpful for getting from an image to binary code.
By Logical Elegance4.8
188188 ratings
John McMaster (@johndmcmaster) told us about the process of opening up chips to see how the processors are structured and what the firmware says.
See John's website for information on getting started (as well as digging much deeper).
John has given some interesting Hardwear.io talks including Capturing Mask ROMs and Taming Hydrofluoric Acid to Extract Firmware. His talks and many others are available on the Hardwear.io archive. Or sign up for the Hardwear.io Online Hardware Security Training, Berlin Jan 2021.
As mentioned in the show:
John wrote a blog post about his top lab accidents and explosions.
Paper: Reverse engineering Flash EEPROM memories using Scanning Electron Microscopy by Franck Courbon, Sergei Skorobogatov, and Christopher Woods
Rompar and bitract are the two programs mentioned as helpful for getting from an image to binary code.

273 Listeners

383 Listeners

288 Listeners

624 Listeners

269 Listeners

580 Listeners

230 Listeners

70 Listeners

989 Listeners

40 Listeners

8,079 Listeners

188 Listeners

62 Listeners

140 Listeners

66 Listeners