27 Years Attacks on Smartcards
This page contains one or more invalid propertie values.
Please fix this as this will break listing functions around the wiki, and causes parsing errors that resulting broken stying around the page containing the property.
Has improper value forThis property is a special property in this wiki. Has assembly type
Website | |
---|---|
Description | Forum and Workshop for Attacks on Smartcards and Security Controllers.
Smart cards and RFIDs are widely used today in manfifold applications, like banking, mobile communications (GSM/SIM), identification and access control. The silicon chip they contain are subject to manifold attacks today and in the future. Newbies, Amateurs, Students, Experts, Nerds are welcome. Beginners Training: Preparation of a chip - removal of the silicon from an RFID label under a microscope. Discussion about historic, actual and new attack scenarios. Tips for the amateur - how to set up your own lab. Discussion round for experts. |
Members | PeterLaackmann |
Projects | create project |
Self-organized Sessions | create self-organized session |
Tags | smart card, security, rfid, reverse engineering, hardware attacks, microscopy, electron microscope, probing station |
Registered on | 16 November 2015 09:51:45 |
Location for self-organized sessions | no |
Self-organized session notes | Forum and Workshop for Attacks on Smartcards and Security Controllers.
Smart cards and RFIDs are widely used today in manfifold applications, like banking, mobile communications (GSM/SIM), identification and access control. The silicon chip they contain are subject to manifold attacks today and in the future. Newbies, Amateurs, Students, Experts, Nerds are welcome. Beginners Training: Preparation of a chip - removal of the silicon from an RFID label under a microscope. Discussion about historic, actual and new attack scenarios. Tips for the amateur - how to set up your own lab. Discussion round for experts. |
Other assemblies by tags... | |
Location | Note: The location on the map does not represent a reservation of a location and might not represent the actual place, where a assembly can be found. The place can be changed within the form of the assembly by anyone. It will be updated by the assembly itself on day 0 or day 1 as soon as the actual location is known.
|
Forum and Workshop for Attacks on Smartcards and Security Controllers.
Smart cards and RFIDs are widely used today in manfifold applications, like banking, mobile communications (GSM/SIM), identification and access control. The silicon chip they contain are subject to manifold attacks today and in the future. Newbies, Amateurs, Students, Experts, Nerds are welcome. Beginners Training: Preparation of a chip - removal of the silicon from an RFID label under a microscope. Discussion about historic, actual and new attack scenarios. Tips for the amateur - how to set up your own lab. Discussion round for experts.