2-Day Training | 25-26 May

IC Reverse Engineering & Embedded Code Extraction Techniques [HITB2021AMS Virtual]

Duration 2 days
Difficulty beginner


Register Now



DATE: 25 & 26 May 2021

TIME: 09:00 to 17:00 CEST/GMT+2

Date Day Time Duration
25 May Tuesday 0900-17:00 CEST/GMT+2 8 Hours
26 May Wednesday 0900-17:00 CEST/GMT+2 8 Hours


(Course timing not suitable? Let us know!) 


All trainees will be entitled to apply for a 30-day ChipJuice license by Texplained!


This training is built to give a complete understanding of Integrated Circuits while explaining the different threats that they face, including the extraction of their embedded software and data. It will also discuss the current state of Integrated Circuits and embedded counter-measures security.

The different chapters are organized so as to let the attendees discover each new topic in a progressive manner that reflects the Reverse-Engineering specific mindset. This proposed learning curve aims at letting the attendees complete the training by strategizing an Invasive Attack involving Reverse-Engineering, circuit modification and micro-probing.

The primary goal of this training is to provide security professionals and team leaders the skills, mindset and background information necessary to successfully perform analysis of Integrated Circuits (ICs), get knowledge about the diverse means of code extraction and evaluate the efficiency of the existing counter-measures.

It is designed to give to Integrated Circuit professionals a deep understanding of the complete Reverse-Engineering and Attack chain to help them explore and/or build more secure designs but also to give to newcomers a detailed overview for a fast ramp-up. The training describes modern analysis methods involving automation and discuss the efficiency of encryption and modern counter-measures in such a context.

Students who complete this course will be familiar with all important classes of low-level hardware attacks (shield and hardware counter-measures bypass – ROM and Flash/EEPROM dump – bus passive and active probing – …) through real world examples covering the entire analysis workflow from the lab to the data analysis.

Who Should Attend

  • Digital police investigators
  • Forensic investigators in other law-enforcement agencies
  • Integrated circuit design & test engineers
  • Engineers involved in securing hardware platforms against attacks
  • Researchers who want to understand the nature of many hardware attacks
  • Team leaders
  • Hardware hackers who want to become familiar with attacks on integrated circuits
  • Parties involved in hardware reverse-engineering and Vulnerability analysis

What Students Say About This Training

“Yes, I would highly recommend this course to anyone with an interest in learning about IC reverse engineering.”

“RE of the logic cells was the most interesting, but general knowledge of what can be done on modern ICs was the most useful.”

“It’s hard to highlight one special thing, part or topic. The course as a whole was exceptionally interesting. If i’m pressed to pick one, i would say it was the reversing of standard cells from an SEM-image.”

Hardware / Software Requirements

None. Students will be provided assignments on paper as well as the training material asa .pdf file



Expand All

Digital Electronics

• Combinatorial Logic
• Sequential Logic
• Memories

Failure Analysis

• Deprocessing / Delayering
• Principle
• Wet Chemicals
• Dry Chemicals
• Imagery
• Circuit Modification

Invasive Attacks

• First Step
• ROM Code Recovery
• FLASH Code Recovery
• Linear Code Extraction
• Invasive Attacks involving Reverse Engineering
• Reverse Engineering Standard Cells

Sign Up For an Account

to track your favorites

Sign Up

Want a Training Not Seen Here?

Write to Us

Contact Us