2021
DOI: 10.1007/s13389-021-00268-5
|View full text |Cite
|
Sign up to set email alerts
|

A survey of algorithmic methods in IC reverse engineering

Abstract: The discipline of reverse engineering integrated circuits (ICs) is as old as the technology itself. It grew out of the need to analyze competitor's products and detect possible IP infringements. In recent years, the growing hardware Trojan threat motivated a fresh research interest in the topic. The process of IC reverse engineering comprises two steps: netlist extraction and specification discovery. While the process of netlist extraction is rather well understood and established techniques exist throughout t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 24 publications
(17 citation statements)
references
References 66 publications
0
15
0
Order By: Relevance
“…Similar to the attacks, the defense solutions can be designed for networking communications, device software, and/or device hardware. With respect to hardware-based defensive solutions, reverse engineering is one of the effective methods for hardware trust and assurance [118][119][120]. Although originally used for negative purposes (e.g., dis- [114].…”
Section: Cyber Attacks and Defenses In Medical Domainmentioning
confidence: 99%
See 1 more Smart Citation
“…Similar to the attacks, the defense solutions can be designed for networking communications, device software, and/or device hardware. With respect to hardware-based defensive solutions, reverse engineering is one of the effective methods for hardware trust and assurance [118][119][120]. Although originally used for negative purposes (e.g., dis- [114].…”
Section: Cyber Attacks and Defenses In Medical Domainmentioning
confidence: 99%
“…Similar to the attacks, the defense solutions can be designed for networking communications, device software, and/or device hardware. With respect to hardware-based defensive solutions, reverse engineering is one of the effective methods for hardware trust and assurance [118][119][120]. Although originally used for negative purposes (e.g., disclosing sensitive information to a competitor/adversary), it can detect malicious alteration and/or tampering (applied by semiconductor foundries) with high accuracy.…”
Section: Cyber Attacks and Defenses In Medical Domainmentioning
confidence: 99%
“…Although our work was faced with methodological challenges that we discuss in the limitations section, we render the following main contributions advancing the current scientific knowledge of technical and cognitive processes in HRE. 1) We propose and examine an HRE phase model based on an exploratory behavioral study of human reverse engineers, who solved a realistic HRE task.…”
Section: Overview On Our Exploratory Studymentioning
confidence: 99%
“…HRE is a multilayered process, where high-level information is extracted from a low-level circuit, consisting of two major stages [1]: In the first stage, a gate-level netlist is obtained from an IC either directly from the device or possibly through (online) interception of design information. A gatelevel netlist is a logical circuit description and is usually composed of Boolean gates and their respective interconnections.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation