News from the SEC Consult Vulnerability Lab

Cryptographic vulnerabilities in the OSCI-Transport Library, a core communication component of German e-government infrastructure

In good hands.

Our SEC Consult Portfolio provides multiple ways to implement your cyber security strategy.

Ready when you are.

Victim of a cyber attack? The SEC Defence-Team is there for your company at 24/7.

Top notch.

The SEC Consult Vulnerability Lab applies current research results to ensure the best possible protection of your company.

Reverse Engineering Architecture and Pinout of Custom ASICs

  • Posted by Monika Greil
  • On 26. Feb
Learn about the process of initial reverse engineering the pinout of unknown ASICs by using moderate methods. The two described ICs are good examples out of many industry-solutions and have been chosen to demonstrate how design decisions from vendors are made. The exploited potential leak of the supply-chain can be leveraged by a hardware reverse engineer to extract internal information about such systems.
Read More

Concerned about your Cyber Security Status?

Get in touch with our specialists

Cookie Preference

Please select an option. You can find more information about the consequences of your choice at Help.

Select an option to continue

Your selection was saved!

Help

Help

To continue, you must make a cookie selection. Below is an explanation of the different options and their meaning.

  • Accept all cookies:
    All cookies such as tracking and analytics cookies.
  • Accept first-party cookies only:
    Only cookies from this website.
  • Reject all tracking cookies:
    No cookies except for those necessary for technical reasons are set.

You can change your cookie setting here anytime: Blog. Blog

Back