Proceedings of the 24th Asia and South Pacific Design Automation Conference 2019
DOI: 10.1145/3287624.3288741
|View full text |Cite
|
Sign up to set email alerts
|

Towards cognitive obfuscation

Abstract: In contrast to software reverse engineering, there are hardly any tools available that support hardware reversing. Therefore, the reversing process is conducted by human analysts combining several complex semi-automated steps. However, countermeasures against reversing are evaluated solely against mathematical models. Our research goal is the establishment of cognitive obfuscation based on the exploration of underlying psychological processes. We aim to identify problems which are hard to solve for human analy… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…Human analysts conducting gate-level netlist reverse engineering are often supported by semi-automatable tools that enable algorithmic graph-based and machine learning methods as well as allow for detailed visual inspection for the purpose of structural and functional analyses [12], [14]. Since no fully automated tools for HRE exist, human engineers are always involved in the process of gate-level netlist reversing.…”
Section: Background a Hardware Reverse Engineeringmentioning
confidence: 99%
“…Human analysts conducting gate-level netlist reverse engineering are often supported by semi-automatable tools that enable algorithmic graph-based and machine learning methods as well as allow for detailed visual inspection for the purpose of structural and functional analyses [12], [14]. Since no fully automated tools for HRE exist, human engineers are always involved in the process of gate-level netlist reversing.…”
Section: Background a Hardware Reverse Engineeringmentioning
confidence: 99%