2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2016
DOI: 10.1109/hst.2016.7495560
|View full text |Cite
|
Sign up to set email alerts
|

Functional block identification in circuit design recovery

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…This is a divide-and-conquer approach to analyse all submodules separately. Various approaches for netlist partitioning exist, like for example separation along the data path by word identification [16], functional block identification [17] or graph partitioning [18]. Input/Output (I/O) Signal Identification.…”
Section: Functional Re -Netlist Abstractionmentioning
confidence: 99%
“…This is a divide-and-conquer approach to analyse all submodules separately. Various approaches for netlist partitioning exist, like for example separation along the data path by word identification [16], functional block identification [17] or graph partitioning [18]. Input/Output (I/O) Signal Identification.…”
Section: Functional Re -Netlist Abstractionmentioning
confidence: 99%
“…One such example are algorithms like min-cut that find a partition of a graph into subgraphs such that the number of edges between them is minimal. In [16], a pure graph-based algorithm that does not use any functional information splits the circuit into densely connected subgraphs. It employs the NCut algorithm, which is a variant of min-cut.…”
Section: Circuit Partitioningmentioning
confidence: 99%
“…However, an unstructured RTL code lacking comments and hierarchy might still be insufficient to retrieve the specification data. Notably, automatic translation to higher abstraction level remains a hard task, and hence, most of the recent work relies on a library of components that serves as a reference for matching subcircuits within the investigated device [15][16][17]36,62].…”
mentioning
confidence: 99%
“…7. Netlist Abstraction: Abstraction is done, for instance, by structural graph-analysis [18] or structural block analysis [19].…”
Section: A Hardware Reverse Engineeringmentioning
confidence: 99%