Proceedings of the 48th Design Automation Conference 2011
DOI: 10.1145/2024724.2024805
|View full text |Cite
|
Sign up to set email alerts
|

The state-of-the-art in semiconductor reverse engineering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
107
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 236 publications
(113 citation statements)
references
References 5 publications
0
107
0
Order By: Relevance
“…Indeed, obfuscation techniques aim to increase reverseengineering time. The time is at least linear with the area [10]. Increasing the area increases the time needed for reverse engineering.…”
Section: Logic Obfuscationmentioning
confidence: 99%
See 1 more Smart Citation
“…Indeed, obfuscation techniques aim to increase reverseengineering time. The time is at least linear with the area [10]. Increasing the area increases the time needed for reverse engineering.…”
Section: Logic Obfuscationmentioning
confidence: 99%
“…The correct unlocking key k is found by using the laws in (10), and considering the type of inserted gate. As a didactic example, let us consider the following 3-input Boolean function f {0, 1} 3 → {0, 1} 1 :…”
Section: Logic Lockingmentioning
confidence: 99%
“…The small logical resources requirement of the proposed spy circuitry makes reverse engineering it harder, although not impossible [32]. Even with recent CMOS technologies, the attacker can reverse engineer ICs using a scanning electron microscope and an automatic tool for circuitry extraction [32], [33]. Nevertheless, the smaller the piece of hardware used for BFSK transmitter the harder it is to detect during reverse engineering.…”
Section: Number_ftiles = N + K + 2 (I)mentioning
confidence: 99%
“…The reverse engineering is the discipline that combines all of the techniques and tools related to the understanding of an existent software system (or equipment) [1]. Its goal is to recover the design model in order to recreate the abstraction model from the source of information (physical schema of data source, source code, documentation,).…”
Section: Introductionmentioning
confidence: 99%