Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×
Security

Submission + - Semi-Automatic hacking of Masked ROM code from Microscopic images (blogspot.co.uk)

An anonymous reader writes: Decapping chips and recovering code or data is nothing new, but the old problem of recovering Masked ROM through visual inspection (binary '0' and '1' can be distinguished within the images) is normally done by crowd sourcing a manual typing effort. Now a tool that semi-automates this process and then recovers the data automatically has been released. This blog tells the tale.
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Semi-Automatic hacking of Masked ROM code from Microscopic images

Comments Filter:

Can't open /usr/fortunes. Lid stuck on cookie jar.

Working...