A survey of algorithmic methods in IC reverse engineering

被引:22
|
作者
Azriel, Leonid [1 ]
Speith, Julian [2 ,3 ]
Albartus, Nils [2 ,3 ]
Ginosar, Ran [1 ]
Mendelson, Avi [1 ]
Paar, Christof [2 ,3 ]
机构
[1] Technion Israel Inst Technol, Haifa, Israel
[2] Max Planck Inst Secur & Privacy, Bochum, Germany
[3] Ruhr Univ Bochum, Bochum, Germany
基金
欧洲研究理事会;
关键词
Hardware reverse engineering; Survey; Boolean function learning; Logical equivalence checking;
D O I
10.1007/s13389-021-00268-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The discipline of reverse engineering integrated circuits (ICs) is as old as the technology itself. It grew out of the need to analyze competitor's products and detect possible IP infringements. In recent years, the growing hardware Trojan threat motivated a fresh research interest in the topic. The process of IC reverse engineering comprises two steps: netlist extraction and specification discovery. While the process of netlist extraction is rather well understood and established techniques exist throughout the industry, specification discovery still presents researchers with a plurality of open questions. It therefore remains of particular interest to the scientific community. In this paper, we present a survey of the state of the art in IC reverse engineering while focusing on the specification discovery phase. Furthermore, we list noteworthy existing works on methods and algorithms in the area and discuss open challenges as well as unanswered questions. Therefore, we observe that the state of research on algorithmic methods for specification discovery suffers from the lack of a uniform evaluation approach. We point out the urgent need to develop common research infrastructure, benchmarks, and evaluation metrics.
引用
收藏
页码:299 / 315
页数:17
相关论文
共 50 条
  • [41] Strong Logic Obfuscation with Low Overhead against IC Reverse Engineering Attacks
    Alasad, Qutaiba
    Yuan, Jiann-Shuin
    Subramanyan, Pramod
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2020, 25 (04)
  • [42] Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes
    El Massad, Mohamed
    Garg, Siddharth
    Tripunitara, Mahesh, V
    22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [43] Virtual qualification of IC sockets using Probabilistic engineering methods
    Lopez, Leon
    Nathan, Swami
    ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, 2007 PROCEEDINGS, 2006, : 271 - +
  • [44] SURVEY OF ALGORITHMIC METHODS FOR YIELD ENHANCEMENT AND RELIABILITY OF CELLULAR PROCESSING ARRAYS
    DOLGUSHEV, SA
    DONIANTS, VN
    LAZAREV, VG
    SYSTOLIC ARRAY PROCESSORS, 1989, : 467 - 476
  • [45] Modern Reverse Engineering Methods Used to Modification of Jewelry
    Kroma, Arkadiusz
    Adamczak, Oliwia
    Sika, Robert
    Gorski, Filip
    Kuczko, Wieslaw
    Grzeskowiak, Krzysztof
    ADVANCES IN SCIENCE AND TECHNOLOGY-RESEARCH JOURNAL, 2020, 14 (04) : 298 - 306
  • [46] Data Collection and Model Construction Methods for Reverse Engineering
    Jiang, Lingyun
    Wang, Zhibiao
    DIGITAL DESIGN AND MANUFACTURING TECHNOLOGY, PTS 1 AND 2, 2010, 102-104 : 189 - 193
  • [47] Towards a precise description of reverse engineering methods and tools
    Jarzabek, S
    Woon, I
    FIRST EUROMICRO CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING, PROCEEDINGS, 1997, : 3 - 9
  • [48] Reverse Engineering IoT Devices: Effective Techniques and Methods
    Shwartz, Omer
    Mathov, Yael
    Bohadana, Michael
    Elovici, Yuval
    Oren, Yossi
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06): : 4965 - 4976
  • [49] Algorithmic Methods
    Schneebeli, H. R.
    ELEMENTE DER MATHEMATIK, 2010, 65 (01) : 44 - 44
  • [50] Algorithmic Social Engineering
    Cowgill, Bo
    Stevenson, Megan T.
    AEA PAPERS AND PROCEEDINGS, 2020, 110 : 96 - 100