Olivier Thomas

Affiliation:

Texplained

Country:

France


Sessions

03-23
13:00
120min
NVM Extraction Using Fully Invasive-Attack
Olivier Thomas

In this tutorial, the attendees will be given the chance to learn how to find memories on Integrated-Circuit substrate layer pictures, reverse-engineer standard-cells and elaborate a strategy to dump NVM memories such as Flash using fully invasive techniques including micro-probing.

Syllabus:
- Structure of an Integrated Circuit
- Find the memories using substrate layer pictures
- Netlist extraction demo using ChipJuice
- Reverse-Engineer standard cells
- Strategize a fully invasive memory dump

Requirements
Attendees are expected to have basic knowledge of :
- the basic structure of an IC
- microcontrollers architecture basics

Bring your paper and pen to take note and solve the assignments. A computer with Photoshop might be useful but is not fully required. Slides will be given to attendees for a better experience.

Tutorials
Tutorial Room A
03-23
15:30
120min
NVM Extraction Using Fully Invasive-Attack
Olivier Thomas

In this tutorial, the attendees will be given the chance to learn how to find memories on Integrated-Circuit substrate layer pictures, reverse-engineer standard-cells and elaborate a strategy to dump NVM memories such as Flash using fully invasive techniques including micro-probing.

Syllabus:
- Structure of an Integrated Circuit
- Find the memories using substrate layer pictures
- Netlist extraction demo using ChipJuice
- Reverse-Engineer standard cells
- Strategize a fully invasive memory dump

Requirements
Attendees are expected to have basic knowledge of :
- the basic structure of an IC
- microcontrollers architecture basics

Bring your paper and pen to take note and solve the assignments. A computer with Photoshop might be useful but is not fully required. Slides will be given to attendees for a better experience.

Tutorials
Tutorial Room A
03-25
11:50
55min
Panel Discussion: A Ghidra Moment for Hardware?
Andrew Zonenberg, Julian Speith, Olivier Thomas, Chris Pawlowicz, Bernhard Lippmann, John McMaster

For two decades, reverse engineering has evolved from a niche manual craft into a foundational pillar of security assurance. Yet, as the two impulse talks at the beginning of this session have shown, the field currently stands at a crossroads. While we look upon years of research and hundreds of technical methods, the practical reality is a landscape of fragmented prototypes, low reproducibility, and significant "translation friction" between academic theory and industry application.

This panel discussion moves beyond the "what" of reverse engineering to confront the "how" of its future. We bring together a diverse cohort of experts to bridge the gap between academic success, open-source mindset and contributions, and industry-grade workflows. This panel will discuss a range of ongoing challenges and their potential for tension between stakeholders, but also promising solutions, all to aim for a future where automated netlist analysis is not just a research possibility, but a reliable, scalable, and trustworthy reality.

Session IV - Panel Talks: Evolution and Future of Reverse Engineering
Lecture Hall