SLIDE 46 Appendix Ressources Talk Video Recordings Webpages
Resources I
[Bla08] Blackhat DC 2008. Security Failures In Secure Devices, 2008. Available from: http://www.blackhat.com/presentations/bh-dc-08/Tarnovsky/ Presentation/bh-dc-08-tarnovsky.pdf. [Cry09] Cryptographic Hardware and Embedded Systems. The State-of-the-Art in IC Reverse Engineering at Chipworks, 2009. Available from: http://www.iacr.org/workshops/ches/ches2009/presentations/12_ Invited_Talk_III/CHES2009_torrance.pdf. [Kum00]
Chip detectives [reverse engineering]. Spectrum, IEEE, 37(11):43 –48, nov 2000. doi:10.1109/6.880953. [LAK98]
- D. Lagunovsky, S. Ablameyko, and M. Kutas.
Recognition of integrated circuit images in reverse engineering. In Pattern Recognition, 1998. Proceedings. Fourteenth International Conference on, volume 2, pages 1640 –1642 vol.2, aug 1998. doi:10.1109/ICPR.1998.712032. [MN08]
- G. Masalskis and R. Navickas.
Reverse engineering of cmos integrated circuits. ELEKTRONIKA IR ELEKTROTECHNIKA, (8):25–28, 2008. Available from: http://www.ktu.edu/lt/mokslas/zurnalai/elektros_z/z88/05_ISSN_ 1392-1215_Reverse%20Engineering%20of%20CMOS%20Integrated%20Circuits.pdf. Steffen Malkowsky, Christoph M¨ uller CMOS Reverse Engineering