2019
DOI: 10.1109/tdsc.2018.2812183
|View full text |Cite
|
Sign up to set email alerts
|

HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 66 publications
(38 citation statements)
references
References 40 publications
0
35
0
Order By: Relevance
“…This is a realistic assumption 1 for most deployed embedded devices, where the bitstream is usually stored in plaintext on the same PCB along with the targeted FPGA. We used the HAL framework [6] to identify and manipulate the relevant netlist components. From our result, we are confident that a hardware configuration must not be fully known to also accomplish more complicated Trojan insertions at a very late stage.…”
Section: • Perform Correct Bitstream File Patchingmentioning
confidence: 99%
See 1 more Smart Citation
“…This is a realistic assumption 1 for most deployed embedded devices, where the bitstream is usually stored in plaintext on the same PCB along with the targeted FPGA. We used the HAL framework [6] to identify and manipulate the relevant netlist components. From our result, we are confident that a hardware configuration must not be fully known to also accomplish more complicated Trojan insertions at a very late stage.…”
Section: • Perform Correct Bitstream File Patchingmentioning
confidence: 99%
“…Hence, there is no official support for developing open source bitstream generation tools similar to Project IceStorm [27], which reversed the Lattice iCE40 FPGAs. Such a tool improves the flexibility for designers and researchers, i.e., it could extend (security) frameworks like HAL [6], Torc [19], or RapidSmith [9].…”
Section: Introductionmentioning
confidence: 99%
“…. Figure 5: Overview of the original HAL architecture from [12] data model. While such an event system is generally used in GUI and game design, we explicitly designed this system to create information which can be used by a psychological analyst to trace the user's actions.…”
Section: Halmentioning
confidence: 99%
“…• Improved Hardware Reverse Engineering Tool HAL. We significantly advance the development of our hardware reverse engineering software HAL [12] to adequately capture human behavior as a foundation for this research. • Cognitive Obfuscation Methods.…”
Section: Introductionmentioning
confidence: 99%
“…We now provide details of the practice-oriented hardware reverse engineering course. Prior to the course and task descriptions in Section IV-B, we first introduce the educational software environment based on the interactive gate-level netlist reverse engineering and manipulation tool HAL [17] (Section IV-A).…”
Section: Educational Research As the Foundation For A Reverse Engmentioning
confidence: 99%