For immediate assistance browse through our support center. You can find answers to many questions in just a few minutes.
If still experiencing problems, send us a report.
Video: Reverse engineering a Qualcomm baseband
Ranking is calculated from a formula comprised of user reviews and usage data. Learn more ›
15 Jan 2012 | News Items | Contributor(s): Author Author
At the recently concluded Chaos Communication Congress 28C3 “behind enemy lines” conference in Berlin, Germany, Guillaume Delugré presented this talk on reverse-engineering a Qualcomm baseband. …
Hardware security in DesignCon 2012
16 Jan 2012 | News Items | Contributor(s): Author Author
DesignCon will be held in Santa Clara, California between 30 January and 2 February. This year it includes two papers in hardware security area. SPEAKER/S: Luke Teyssier (CRI) DAY / TIME / LOCATION: …
Targeting RF key security
27 Jan 2012 | News Items | Contributor(s): Author Author
DesignCon 2012 will see two live demonstrations of key recovery from mobile devices through RF electromagnetic (EM) signal analysis. These are part of the presentation, "Secret Cryptographic Key …
Total 3 results found.