rompar: a tool to analyze masked ROMs

Posted on Thursday, July 18th, 2013 in Chips, open source, reversed, tools by the machinegeek

top left grid column and row
You may have seen those highly magnified photos of decapped chips displaying the hardware architecture and wondered what information is represented by the solder-like designs.

Adam “Major Malfunction” Laurie of Aperature Labs has developed a software tool to assist in deciphering the bits represented in these highly magnified chip photos. Known as rompar, its a Python tool for semi-automatic extraction of data from microscopic images of masked ROM.

For more photos and project details visit Aperature Labs.

This entry was posted on Thursday, July 18th, 2013 at 1:00 pm and is filed under Chips, open source, reversed, tools. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

One Response to “rompar: a tool to analyze masked ROMs”

  1. Lloyd A says:

    Now THAT is impressive.

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • Geert Jordaens: I'm not sure what kind of licensing I have to add since it is a fairly straight forward implementation of the adaptive Huffman Decoding. For...
  • erich: For anyone interested, I've added some c++ code for adaptive huffman decoding in the git repository.
  • Sjaak: I would add some more protection in the used trigger file (on the serverpilot site) then not using a standard name :) hopefully they use...
  • Pete Castagna: My friend Charlie who worked in synthesizers at a DOD type of place made a modification to this avalanche pulse generator that allowed him to...
  • Sam Catchpole: Yes please :D