2013
DOI: 10.21236/ada623698
|View full text |Cite
|
Sign up to set email alerts
|

Formal Methods for Reverse Engineering Gate-Level Netlists

Abstract: Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and R… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…Li et al [34,36] tackle the reverse engineering problem by identifying interesting behavioral patterns in the observed logic. Their method employs temporal logic to formulate the behavioral pattern.…”
Section: Functional Analysismentioning
confidence: 99%
“…Li et al [34,36] tackle the reverse engineering problem by identifying interesting behavioral patterns in the observed logic. Their method employs temporal logic to formulate the behavioral pattern.…”
Section: Functional Analysismentioning
confidence: 99%
“…4) Template Matching Attack: Template matching is a structural-based analysis attack that works in the manner of looking for recognizable patterns in the gate-level netlist [10]. Attackers aim to use this approach to reverse engineer a system, where a high-level description of the system is publicly available, and recognizable patterns in the gate-level netlist are identified.…”
Section: B Attacks On Obfuscationmentioning
confidence: 99%
“…al. [27,45] identified internal words based on bitslice aggregation (functional approach) and shapehashing (structural approach). The candidate words found were used as boundaries of operators for further recognition.…”
Section: Introductionmentioning
confidence: 99%
“…al. [29,27] identified functional operators in gate-level circuits, based on an existing library of blocks. Word-level information at the primary inputs was assumed available, but in many applications such information is not given.…”
Section: Introductionmentioning
confidence: 99%