A survey of algorithmic methods in IC reverse engineering

被引:22
|
作者
Azriel, Leonid [1 ]
Speith, Julian [2 ,3 ]
Albartus, Nils [2 ,3 ]
Ginosar, Ran [1 ]
Mendelson, Avi [1 ]
Paar, Christof [2 ,3 ]
机构
[1] Technion Israel Inst Technol, Haifa, Israel
[2] Max Planck Inst Secur & Privacy, Bochum, Germany
[3] Ruhr Univ Bochum, Bochum, Germany
基金
欧洲研究理事会;
关键词
Hardware reverse engineering; Survey; Boolean function learning; Logical equivalence checking;
D O I
10.1007/s13389-021-00268-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The discipline of reverse engineering integrated circuits (ICs) is as old as the technology itself. It grew out of the need to analyze competitor's products and detect possible IP infringements. In recent years, the growing hardware Trojan threat motivated a fresh research interest in the topic. The process of IC reverse engineering comprises two steps: netlist extraction and specification discovery. While the process of netlist extraction is rather well understood and established techniques exist throughout the industry, specification discovery still presents researchers with a plurality of open questions. It therefore remains of particular interest to the scientific community. In this paper, we present a survey of the state of the art in IC reverse engineering while focusing on the specification discovery phase. Furthermore, we list noteworthy existing works on methods and algorithms in the area and discuss open challenges as well as unanswered questions. Therefore, we observe that the state of research on algorithmic methods for specification discovery suffers from the lack of a uniform evaluation approach. We point out the urgent need to develop common research infrastructure, benchmarks, and evaluation metrics.
引用
收藏
页码:299 / 315
页数:17
相关论文
共 50 条
  • [21] Area efficient camouflaging technique for securing IC reverse engineering
    Ali, Md. Liakot
    Hossain, Md. Ismail
    Hossain, Fakir Sharif
    PLOS ONE, 2021, 16 (11):
  • [22] The determination of IC engine inlet port geometries by reverse engineering
    A. Chant
    D. Wilcock
    D. Costello
    The International Journal of Advanced Manufacturing Technology, 1998, 14 : 65 - 69
  • [23] Medical Reverse Engineering Applications and Methods
    Hieu, L. C.
    Sloten, J. V.
    Hung, L. T.
    Khanh, L.
    Soe, S.
    Zlatov, N.
    Phuoc, L. T.
    Trung, P. D.
    2ND INTERNATIONAL CONFERENCE ON INNOVATIONS, RECENT TRENDS AND CHALLENGES IN MECHATRONICS, MECHANICAL ENGINEERING AND NEW HIGH-TECH PRODUCTS DEVELOPMENT (MECAHITECH '10), 2010, : 186 - 196
  • [24] Data reduction methods for reverse engineering
    Lee, KH
    Woo, H
    Suk, T
    INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2001, 17 (10): : 735 - 743
  • [25] Data Reduction Methods for Reverse Engineering
    K.H. Lee
    H. Woo
    T. Suk
    The International Journal of Advanced Manufacturing Technology, 2001, 17 : 735 - 743
  • [26] A Survey on Controller Area Network Reverse Engineering
    Buscemi, Alessio
    Turcanu, Ion
    Castignani, German
    Panchenko, Andriy
    Engel, Thomas
    Shin, Kang G.
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (03): : 1445 - 1481
  • [27] Reverse-engineering of XML Schemas: A Survey
    Klimek, Jakub
    Necasky, Martin
    PROCEEDINGS OF THE DATESO 2010 WORKSHOP - DATESO DATABASES, TEXTS, SPECIFICATIONS, AND OBJECTS, 2010, 567 : 96 - 107
  • [28] Survey on Reverse-engineering Artificial Intelligence
    Li C.-S.
    Wang S.-Y.
    Li Y.-M.
    Zhang C.-Z.
    Yuan Y.
    Wang G.-R.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (02): : 712 - 732
  • [29] A Survey of Automatic Protocol Reverse Engineering Tools
    Narayan, John
    Shukla, Sandeep K.
    Clancy, T. Charles
    ACM COMPUTING SURVEYS, 2015, 48 (03)
  • [30] Advanced X-Ray Inspection Techniques for IC Reverse Engineering
    LaVoy, Rosanne M.
    Babian, Fred
    Reid, Andrew
    ISTFA 2016: CONFERENCE PROCEEDINGS FROM THE 42ND INTERNATIONAL SYMPOSIUM FOR TESTING AND FAILURE ANALYSIS, 2016, : 317 - 326