A survey of algorithmic methods in IC reverse engineering

被引:22
|
作者
Azriel, Leonid [1 ]
Speith, Julian [2 ,3 ]
Albartus, Nils [2 ,3 ]
Ginosar, Ran [1 ]
Mendelson, Avi [1 ]
Paar, Christof [2 ,3 ]
机构
[1] Technion Israel Inst Technol, Haifa, Israel
[2] Max Planck Inst Secur & Privacy, Bochum, Germany
[3] Ruhr Univ Bochum, Bochum, Germany
基金
欧洲研究理事会;
关键词
Hardware reverse engineering; Survey; Boolean function learning; Logical equivalence checking;
D O I
10.1007/s13389-021-00268-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The discipline of reverse engineering integrated circuits (ICs) is as old as the technology itself. It grew out of the need to analyze competitor's products and detect possible IP infringements. In recent years, the growing hardware Trojan threat motivated a fresh research interest in the topic. The process of IC reverse engineering comprises two steps: netlist extraction and specification discovery. While the process of netlist extraction is rather well understood and established techniques exist throughout the industry, specification discovery still presents researchers with a plurality of open questions. It therefore remains of particular interest to the scientific community. In this paper, we present a survey of the state of the art in IC reverse engineering while focusing on the specification discovery phase. Furthermore, we list noteworthy existing works on methods and algorithms in the area and discuss open challenges as well as unanswered questions. Therefore, we observe that the state of research on algorithmic methods for specification discovery suffers from the lack of a uniform evaluation approach. We point out the urgent need to develop common research infrastructure, benchmarks, and evaluation metrics.
引用
收藏
页码:299 / 315
页数:17
相关论文
共 50 条
  • [31] Logic Obfuscation against IC Reverse Engineering Attacks using PLGs
    Alasad, Qutaiba
    Yuan, Jiann
    2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2017, : 341 - 344
  • [32] Implementation of Innovative Digitalization Methods in Reverse Engineering
    Teliskova, Monika
    Pollak, Martin
    Toeroek, Jozef
    Kascak, Jakub
    Baron, Petr
    Mezencevova, Viktoria
    2018 5TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND APPLICATIONS (ICIEA), 2018, : 406 - 409
  • [33] Comparison of software architecture reverse engineering methods
    Stringfellow, C.
    Amory, C. D.
    Potnuri, D.
    Andrews, A.
    Georg, M.
    INFORMATION AND SOFTWARE TECHNOLOGY, 2006, 48 (07) : 484 - 497
  • [34] Reverse engineering methods for digital restoration applications
    Boier-Martin, Ioana
    Rushmeier, Holly
    JOURNAL OF COMPUTING AND INFORMATION SCIENCE IN ENGINEERING, 2006, 6 (04) : 364 - 371
  • [35] A methodological approach for characterization of reverse engineering methods
    Propuesta Metodológica para Caracterizar y Seleccionar Métodos de Ingeniería Inversa
    2013, Centro de Informacion Tecnologica (24):
  • [36] Selection of reverse engineering methods for relational databases
    Pedro-de-Jesus, L
    Sousa, P
    PROCEEDINGS OF THE THIRD EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING, 1999, : 194 - 197
  • [37] A SURVEY OF ALGORITHMIC METHODS FOR PARTIALLY OBSERVED MARKOV DECISION PROCESSES
    Lovejoy, William S.
    ANNALS OF OPERATIONS RESEARCH, 1991, 28 (01) : 47 - 65
  • [38] I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering
    Walendy, Rene
    Weber, Markus
    Li, Jingjie
    Becker, Steffen
    Wiesen, Carina
    Elson, Malte
    Kim, Younghyun
    Fawaz, Kassem
    Rummel, Nikol
    Paar, Christof
    PROCEEDINGS OF THE 2024 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYTEMS (CHI 2024), 2024,
  • [39] A Reverse Engineering Role-Play to Teach Systems Engineering Methods
    Bertoni, Alessandro
    EDUCATION SCIENCES, 2019, 9 (01):
  • [40] Investigating AI systems: examining data and algorithmic bias through hermeneutic reverse engineering
    Shukla, Nishanshi
    FRONTIERS IN COMMUNICATION, 2025, 10