SoK: An overview of algorithmic methods in IC reverse engineering

L Azriel, R Ginosar, A Mendelson - … of the 3rd ACM Workshop on Attacks …, 2019 - dl.acm.org
Reverse engineering of integrated circuits (IC) serves an evergrowing need for both
defensive and offensive applications, such as competitive analysis, IP theft evidence and …

A survey of algorithmic methods in IC reverse engineering

L Azriel, J Speith, N Albartus, R Ginosar… - Journal of Cryptographic …, 2021 - Springer
The discipline of reverse engineering integrated circuits (ICs) is as old as the technology
itself. It grew out of the need to analyze competitor's products and detect possible IP …

Machine learning and structural characteristics for reverse engineering

J Baehr, A Bernardini, G Sigl… - … of the 24th Asia and South …, 2019 - dl.acm.org
In the past years, much of the research into hardware reverse engineering has focused on
the abstraction of gate level netlists to a human readable form. However, none of the …

Vital: Verifying trojan-free physical layouts through hardware reverse engineering

M Ludwig, AC Bette, B Lippmann - 2021 IEEE Physical …, 2021 - ieeexplore.ieee.org
The semiconductor industry is heavily relying on outsourcing of design, fabrication, and
testing to third parties. The threat of possibly malicious actors in this ramified supply-chain …

Reverse engineering of cryptographic cores by structural interpretation through graph analysis

M Werner, B Lippmann, J Baehr… - 2018 IEEE 3rd …, 2018 - ieeexplore.ieee.org
Reverse Engineering of Cryptographic Cores by Structural Interpretation Through Graph Analysis
Page 1 Reverse Engineering of Cryptographic Cores by Structural Interpretation through Graph …

The old frontier of reverse engineering: Netlist partitioning

T Meade, K Shamsi, T Le, J Di, S Zhang… - Journal of Hardware and …, 2018 - Springer
Without access to high-level details of commercialized integrated circuits (IC), it might be
impossible to find potential design flaws or limiting use cases. To assist in high-level …

CRESS: Framework for Vulnerability Assessment of Attack Scenarios in Hardware Reverse Engineering

M Ludwig, A Hepp, M Brunner… - 2021 IEEE Physical …, 2021 - ieeexplore.ieee.org
Trust and security of microelectronic systems are a major driver for game-changing trends
like autonomous driving or the internet of things. These trends are endangered by threats …

Neta: when ip fails, secrets leak

T Meade, J Portillo, S Zhang, Y Jin - Proceedings of the 24th Asia and …, 2019 - dl.acm.org
Assuring the quality and the trustworthiness of third party resources has been a hard
problem to tackle. Researchers have shown that analyzing Integrated Circuits (IC), without …

GraphClusNet: A Hierarchical Graph Neural Network for Recovered Circuit Netlist Partitioning

X Hong, T Lin, Y Shi, BH Gwee - IEEE Transactions on Artificial …, 2022 - ieeexplore.ieee.org
Hardware assurance (HA) is imperative to ensure the integrity of integrated circuits (ICs)
after manufacturing. To verify the integrity of an IC would require the extraction of relevant …

Enabling trust for advanced semiconductor solutions based on physical layout verification

M Ludwig, B Lippmann, N Unverricht - Intelligent System Solutions for Auto …, 2021 - Springer
With growing connectivity in consumer and industrial applications, the need for security rises
proportionally. Compromises in security design of eg autonomous driving systems endanger …