Christian Kison
YOU?
Author Swipe
View article: Stealing Maggie's Secrets -- On the Challenges of IP Theft Through FPGA Reverse Engineering
Stealing Maggie's Secrets -- On the Challenges of IP Theft Through FPGA Reverse Engineering Open
Intellectual Property (IP) theft is a cause of major financial and reputational damage, reportedly in the range of hundreds of billions of dollars annually in the U.S. alone. Field Programmable Gate Arrays (FPGAs) are particularly exposed …
View article: An Exploratory Analysis of Microcode as a Building Block for System\n Defenses
An Exploratory Analysis of Microcode as a Building Block for System\n Defenses Open
Microcode is an abstraction layer used by modern x86 processors that\ninterprets user-visible CISC instructions to hardware-internal RISC\ninstructions. The capability to update x86 microcode enables a vendor to modify\nCPU behavior in-fie…
View article: An Exploratory Analysis of Microcode as a Building Block for System Defenses
An Exploratory Analysis of Microcode as a Building Block for System Defenses Open
Microcode is an abstraction layer used by modern x86 processors that interprets user-visible CISC instructions to hardware-internal RISC instructions. The capability to update x86 microcode enables a vendor to modify CPU behavior in-field,…
View article: Reverse Engineering x86 Processor Microcode
Reverse Engineering x86 Processor Microcode Open
Microcode is an abstraction layer on top of the physical components of a CPU and present in most general-purpose CPUs today. In addition to facilitate complex and vast instruction sets, it also provides an update mechanism that allows CPUs…
View article: Hardware reverse engineering: Overview and open challenges
Hardware reverse engineering: Overview and open challenges Open
Hardware reverse engineering is a universal tool for both legitimate and\nillegitimate purposes. On the one hand, it supports confirmation of IP\ninfringement and detection of circuit malicious manipulations, on the other\nhand it provides…