HAL-The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion
Fyrbiak, Marc, Wallat, Sebastian, Swierczynski, Pawel, Hoffmann, Max, Hoppach, Sebastian, Wilhelm, Matthias, Weidlich, Tobias, Tessier, Russell, Paar, Christof
Published in IEEE transactions on dependable and secure computing (01.05.2019)
Published in IEEE transactions on dependable and secure computing (01.05.2019)
Get full text
Journal Article
Graph Similarity and its Applications to Hardware Security
Fyrbiak, Marc, Wallat, Sebastian, Reinhard, Sascha, Bissantz, Nicolai, Paar, Christof
Published in IEEE transactions on computers (01.04.2020)
Published in IEEE transactions on computers (01.04.2020)
Get full text
Journal Article
A look at the dark side of hardware reverse engineering - a case study
Wallat, Sebastian, Fyrbiak, Marc, Schlogel, Moritz, Paar, Christof
Published in 2017 IEEE 2nd International Verification and Security Workshop (IVSW) (01.07.2017)
Published in 2017 IEEE 2nd International Verification and Security Workshop (IVSW) (01.07.2017)
Get full text
Conference Proceeding
Insights into the Mind of a Trojan Designer The Challenge to Integrate a Trojan into the Bitstream
Ender, Maik, Swierczynski, Pawel, Wallat, Sebastian, Wilhelm, Matthias, Knopp, Paul Martin, Paar, Christof
Published in 2019 24th Asia and South Pacific Design Automation Conference (ASP-DAC) (21.01.2019)
Published in 2019 24th Asia and South Pacific Design Automation Conference (ASP-DAC) (21.01.2019)
Get full text
Conference Proceeding
A Look at the Dark Side of Hardware Reverse Engineering -- A Case Study
Wallat, Sebastian, Fyrbiak, Marc, Schlögel, Moritz, Paar, Christof
Published in arXiv.org (01.10.2019)
Published in arXiv.org (01.10.2019)
Get full text
Paper
Journal Article
Hardware reverse engineering: Overview and open challenges
Fyrbiak, Marc, Strauss, Sebastian, Kison, Christian, Wallat, Sebastian, Elson, Malte, Rummel, Nikol, Paar, Christof
Published in 2017 IEEE 2nd International Verification and Security Workshop (IVSW) (01.07.2017)
Published in 2017 IEEE 2nd International Verification and Security Workshop (IVSW) (01.07.2017)
Get full text
Conference Proceeding
Towards Cognitive Obfuscation: Impeding Hardware Reverse Engineering Based on Psychological Insights
Wiesen, Carina, Albartus, Nils, Hoffmann, Max, Becker, Steffen, Wallat, Sebastian, Fyrbiak, Marc, Rummel, Nikol, Paar, Christof
Published in 2019 24th Asia and South Pacific Design Automation Conference (ASP-DAC) (21.01.2019)
Published in 2019 24th Asia and South Pacific Design Automation Conference (ASP-DAC) (21.01.2019)
Get full text
Conference Proceeding
Insights into the Mind of a Trojan Designer: The Challenge to Integrate a Trojan into the Bitstream
Ender, Maik, Swierczynski, Pawel, Wallat, Sebastian, Wilhelm, Matthias, Paul Martin Knopp, Paar, Christof
Published in arXiv.org (01.10.2019)
Published in arXiv.org (01.10.2019)
Get full text
Paper
Journal Article
Towards Cognitive Obfuscation: Impeding Hardware Reverse Engineering Based on Psychological Insights
Wiesen, Carina, Albartus, Nils, Hoffmann, Max, Becker, Steffen, Wallat, Sebastian, Fyrbiak, Marc, Rummel, Nikol, Paar, Christof
Published in arXiv.org (01.10.2019)
Published in arXiv.org (01.10.2019)
Get full text
Paper
Journal Article
Hardware Reverse Engineering: Overview and Open Challenges
Fyrbiak, Marc, Strauß, Sebastian, Kison, Christian, Wallat, Sebastian, Elson, Malte, Rummel, Nikol, Paar, Christof
Published in arXiv.org (01.10.2019)
Published in arXiv.org (01.10.2019)
Get full text
Paper
Journal Article
Highway to HAL: Open-Sourcing the First Extendable Gate-Level Netlist Reverse Engineering Framework
Wallat, Sebastian, Albartus, Nils, Becker, Steffen, Hoffmann, Max, Ender, Maik, Fyrbiak, Marc, Drees, Adrian, Maaßen, Sebastian, Paar, Christof
Published in arXiv.org (01.10.2019)
Published in arXiv.org (01.10.2019)
Get full text
Paper
Journal Article