A survey of algorithmic methods in IC reverse engineering

被引:0
|
作者
Leonid Azriel
Julian Speith
Nils Albartus
Ran Ginosar
Avi Mendelson
Christof Paar
机构
[1] Technion - Israel Institute of Technology,
[2] Max Planck Institute for Security and Privacy,undefined
[3] Ruhr University Bochum,undefined
来源
关键词
Hardware reverse engineering; Survey; Boolean function learning; Logical equivalence checking;
D O I
暂无
中图分类号
学科分类号
摘要
The discipline of reverse engineering integrated circuits (ICs) is as old as the technology itself. It grew out of the need to analyze competitor’s products and detect possible IP infringements. In recent years, the growing hardware Trojan threat motivated a fresh research interest in the topic. The process of IC reverse engineering comprises two steps: netlist extraction and specification discovery. While the process of netlist extraction is rather well understood and established techniques exist throughout the industry, specification discovery still presents researchers with a plurality of open questions. It therefore remains of particular interest to the scientific community. In this paper, we present a survey of the state of the art in IC reverse engineering while focusing on the specification discovery phase. Furthermore, we list noteworthy existing works on methods and algorithms in the area and discuss open challenges as well as unanswered questions. Therefore, we observe that the state of research on algorithmic methods for specification discovery suffers from the lack of a uniform evaluation approach. We point out the urgent need to develop common research infrastructure, benchmarks, and evaluation metrics.
引用
收藏
页码:299 / 315
页数:16
相关论文
共 50 条
  • [1] A survey of algorithmic methods in IC reverse engineering
    Azriel, Leonid
    Speith, Julian
    Albartus, Nils
    Ginosar, Ran
    Mendelson, Avi
    Paar, Christof
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2021, 11 (03) : 299 - 315
  • [2] SoK: An Overview of Algorithmic Methods in IC Reverse Engineering
    Azriel, Leonid
    Ginosar, Ran
    Mendelson, Avi
    [J]. PROCEEDINGS OF THE 3RD ACM WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY WORKSHOP (ASHES '19), 2019, : 65 - 74
  • [3] Sok: An overview of algorithmic methods in IC reverse engineering
    Azriel, Leonid
    Ginosar, Ran
    Mendelson, Avi
    [J]. Proceedings of the ACM Conference on Computer and Communications Security, 2019, : 65 - 74
  • [4] Protocol Reverse-Engineering Methods and Tools: A Survey
    Huang, Yuyao
    Shu, Hui
    Kang, Fei
    Guang, Yan
    [J]. COMPUTER COMMUNICATIONS, 2022, 182 : 238 - 254
  • [5] Survey on Network Protocol Reverse Engineering Approaches, Methods and Tools
    Sija, Baraka D.
    Goo, Young-Hoon
    Kyu-Seok-Shim
    Kim, Sungyun
    Choi, Mi-Jung
    Kim, Myung-Sup
    [J]. 2017 19TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS 2017): MANAGING A WORLD OF THINGS, 2017, : 271 - 274
  • [6] Survey on Applications of Formal Methods in Reverse Engineering and Intellectual Property Protection
    Shahrzad Keshavarz
    Cunxi Yu
    Samaneh Ghandali
    Xiaolin Xu
    Daniel Holcomb
    [J]. Journal of Hardware and Systems Security, 2018, 2 (3) : 214 - 224
  • [7] The State-of-the-Art in IC Reverse Engineering
    Torrance, Randy
    James, Dick
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 363 - 381
  • [8] A Fast and Flexible Software for IC Reverse Engineering
    Kim, Gyungtae
    Ma, Ming
    Park, Inhag
    [J]. 2018 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2018, : 46 - 49
  • [9] METHODS AND APPROACHES FOR REVERSE ENGINEERING
    Chlumecky, Martin
    [J]. SOFTWARE DEVELOPMENT 2012, 2012, : 36 - 42
  • [10] The power of ic reverse engineering for hardware trust and assurance
    Ganji, Fatemeh
    Forte, Domenic
    Asadizanjani, Navid
    Tehranipoor, Mark
    Woodard, Damon
    [J]. Electronic Device Failure Analysis, 2019, 21 (02): : 30 - 36