- Webinar |
- Netherlands 2024 |
- USA 2024 |
- Netherlands 2023 |
- USA 2023 |
- Netherlands 2022 |
- USA 2022 |
- Netherlands 2021 |
- USA 2021 |
- Germany 2021 |
- Berlin 2021 |
- Netherlands 2020 |
- Virtual Con 2020 |
- Berlin 2020 |
- Netherlands 2019 |
- USA 2019 |
- Berlin 2019 |
- Netherlands 2018 |
- Berlin 2018 |
- Netherlands 2017 |
- Netherlands 2016 |
- Netherlands 2015
Andrew Zonenberg
Senior Security Consultant at IOActive
Talk Title
Reverse Engineering of Programmable Logic Bitstreams
Talk Abstract
Despite their growing popularity, programmable logic devices do not have well-developed reverse engineering tools (at the same class as IDA or Radare). Although several projects have successfully reverse engineered undocumented bitstream formats, these efforts have largely focused on the development of open-source compilers. This talk provides an introduction to reverse engineering of circuit netlists from both LUT and PLA based devices, strategies for recovering higher level semantics from cell-level netlists, and methods of extracting bitstreams from locked devices. Full source code (3-clause BSD license) for all tools is provided.
Bio
Dr. Andrew Zonenberg is a senior security consultant at IOActive and works in the company's hardware lab researching Integrated Circuit (IC) security, IC reverse engineering, and embedded/hardware security. Andrew has a PhD in computer science from Rensselaer Polytechnic Institute, focusing on System on Chip (SoC) and Operating System security. During his time at RPI he designed and taught a new one-semester course on semiconductor reverse engineering.