2017 IEEE 2nd International Verification and Security Workshop (IVSW) 2017
DOI: 10.1109/ivsw.2017.8031550
|View full text |Cite
|
Sign up to set email alerts
|

Hardware reverse engineering: Overview and open challenges

Abstract: Hardware reverse engineering is a universal tool for both legitimate and illegitimate purposes. On the one hand, it supports confirmation of IP infringement and detection of circuit malicious manipulations, on the other hand it provides adversaries with crucial information to plagiarize designs, infringe on IP, or implant hardware Trojans into a target circuit. Although reverse engineering is commonplace in practice, the quantification of its complexity is an unsolved problem to date since both technical and h… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
38
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 63 publications
(38 citation statements)
references
References 51 publications
0
38
0
Order By: Relevance
“…Reverse engineering in the field of hardware security is conducted for legitimate as well as illegitimate purposes [10]. On the one hand, security engineers are often forced to conduct reverse engineering to identify counterfeited hardware, security vulnerabilities, or malicious manipulations like hardware Trojans [25].…”
Section: Hardware Reverse Engineeringmentioning
confidence: 99%
See 3 more Smart Citations
“…Reverse engineering in the field of hardware security is conducted for legitimate as well as illegitimate purposes [10]. On the one hand, security engineers are often forced to conduct reverse engineering to identify counterfeited hardware, security vulnerabilities, or malicious manipulations like hardware Trojans [25].…”
Section: Hardware Reverse Engineeringmentioning
confidence: 99%
“…On the one hand, security engineers are often forced to conduct reverse engineering to identify counterfeited hardware, security vulnerabilities, or malicious manipulations like hardware Trojans [25]. On the other hand, hardware reverse engineering is also associated with illegitimate actions such as the analysis of hardware designs on various levels to understand their functionality in order to commit IP infringement, weaken security functions, or to inject Trojans [10].…”
Section: Hardware Reverse Engineeringmentioning
confidence: 99%
See 2 more Smart Citations
“…In the context of hardware security [9], security engineers (as well as adversaries) are forced to employ reverse engineering to make sense of a proprietary hardware design (e.g., to identify security vulnerabilities or security-circuitry for Trojan insertion [10]). During this task, analysis of the gate-level netlist is a crucial step for human reverse engineers [11].…”
Section: Technical Backgroundmentioning
confidence: 99%