A survey of algorithmic methods in IC reverse engineering

被引:22
|
作者
Azriel, Leonid [1 ]
Speith, Julian [2 ,3 ]
Albartus, Nils [2 ,3 ]
Ginosar, Ran [1 ]
Mendelson, Avi [1 ]
Paar, Christof [2 ,3 ]
机构
[1] Technion Israel Inst Technol, Haifa, Israel
[2] Max Planck Inst Secur & Privacy, Bochum, Germany
[3] Ruhr Univ Bochum, Bochum, Germany
基金
欧洲研究理事会;
关键词
Hardware reverse engineering; Survey; Boolean function learning; Logical equivalence checking;
D O I
10.1007/s13389-021-00268-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The discipline of reverse engineering integrated circuits (ICs) is as old as the technology itself. It grew out of the need to analyze competitor's products and detect possible IP infringements. In recent years, the growing hardware Trojan threat motivated a fresh research interest in the topic. The process of IC reverse engineering comprises two steps: netlist extraction and specification discovery. While the process of netlist extraction is rather well understood and established techniques exist throughout the industry, specification discovery still presents researchers with a plurality of open questions. It therefore remains of particular interest to the scientific community. In this paper, we present a survey of the state of the art in IC reverse engineering while focusing on the specification discovery phase. Furthermore, we list noteworthy existing works on methods and algorithms in the area and discuss open challenges as well as unanswered questions. Therefore, we observe that the state of research on algorithmic methods for specification discovery suffers from the lack of a uniform evaluation approach. We point out the urgent need to develop common research infrastructure, benchmarks, and evaluation metrics.
引用
收藏
页码:299 / 315
页数:17
相关论文
共 50 条
  • [1] A survey of algorithmic methods in IC reverse engineering
    Leonid Azriel
    Julian Speith
    Nils Albartus
    Ran Ginosar
    Avi Mendelson
    Christof Paar
    Journal of Cryptographic Engineering, 2021, 11 : 299 - 315
  • [2] SoK: An Overview of Algorithmic Methods in IC Reverse Engineering
    Azriel, Leonid
    Ginosar, Ran
    Mendelson, Avi
    PROCEEDINGS OF THE 3RD ACM WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY WORKSHOP (ASHES '19), 2019, : 65 - 74
  • [3] Sok: An overview of algorithmic methods in IC reverse engineering
    Azriel, Leonid
    Ginosar, Ran
    Mendelson, Avi
    Proceedings of the ACM Conference on Computer and Communications Security, 2019, : 65 - 74
  • [4] Protocol Reverse-Engineering Methods and Tools: A Survey
    Huang, Yuyao
    Shu, Hui
    Kang, Fei
    Guang, Yan
    COMPUTER COMMUNICATIONS, 2022, 182 : 238 - 254
  • [5] Survey on Network Protocol Reverse Engineering Approaches, Methods and Tools
    Sija, Baraka D.
    Goo, Young-Hoon
    Kyu-Seok-Shim
    Kim, Sungyun
    Choi, Mi-Jung
    Kim, Myung-Sup
    2017 19TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS 2017): MANAGING A WORLD OF THINGS, 2017, : 271 - 274
  • [6] Survey on Applications of Formal Methods in Reverse Engineering and Intellectual Property Protection
    Shahrzad Keshavarz
    Cunxi Yu
    Samaneh Ghandali
    Xiaolin Xu
    Daniel Holcomb
    Journal of Hardware and Systems Security, 2018, 2 (3) : 214 - 224
  • [7] A Fast and Flexible Software for IC Reverse Engineering
    Kim, Gyungtae
    Ma, Ming
    Park, Inhag
    2018 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2018, : 46 - 49
  • [8] The State-of-the-Art in IC Reverse Engineering
    Torrance, Randy
    James, Dick
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 363 - 381
  • [9] METHODS AND APPROACHES FOR REVERSE ENGINEERING
    Chlumecky, Martin
    SOFTWARE DEVELOPMENT 2012, 2012, : 36 - 42
  • [10] The power of ic reverse engineering for hardware trust and assurance
    Ganji, Fatemeh
    Forte, Domenic
    Asadizanjani, Navid
    Tehranipoor, Mark
    Woodard, Damon
    Electronic Device Failure Analysis, 2019, 21 (02): : 30 - 36