Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I just saw on the cryptography mailing list that some researchers have succeeded in using both SEM and FIB to see the stealthy dopants:

https://eprint.iacr.org/2014/508

So maybe the dopants have to get even stealthier if they're to avoid expert semiconductor reverse engineers. :-)



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: