Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights

Since underlying hardware components form the basis of trust in virtually any computing system, security failures in hardware pose a devastating threat to our daily lives. Hardware reverse engineering is commonly employed by security engineers in order to identify security vulnerabilities, to detect...

Full description

Saved in:
Bibliographic Details
Published in2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE) pp. 438 - 445
Main Authors Wiesen, Carina, Becker, Steffen, Fyrbiak, Marc, Albartus, Nils, Elson, Malte, Rummel, Nikol, Paar, Christof
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2018
Subjects
Online AccessGet full text
ISSN2470-6698
DOI10.1109/TALE.2018.8615270

Cover

Abstract Since underlying hardware components form the basis of trust in virtually any computing system, security failures in hardware pose a devastating threat to our daily lives. Hardware reverse engineering is commonly employed by security engineers in order to identify security vulnerabilities, to detect IP violations, or to conduct very-large-scale integration (VLSI) failure analysis. Even though industry and the scientific community demand experts with expertise in hardware reverse engineering, there is a lack of educational offerings, and existing training is almost entirely unstructured and on the job. To the best of our knowledge, we have developed the first course to systematically teach students hardware reverse engineering based on insights from the fields of educational research, cognitive science, and hardware security. The contribution of our work is threefold: (1) we propose underlying educational guidelines for practice-oriented courses which teach hardware reverse engineering; (2) we develop such a lab course with a special focus on gate-level netlist reverse engineering and provide the required tools to support it; (3) we conduct an educational evaluation of our pilot course. Based on our results, we provide valuable insights on the structure and content necessary to design and teach future courses on hardware reverse engineering.
AbstractList Since underlying hardware components form the basis of trust in virtually any computing system, security failures in hardware pose a devastating threat to our daily lives. Hardware reverse engineering is commonly employed by security engineers in order to identify security vulnerabilities, to detect IP violations, or to conduct very-large-scale integration (VLSI) failure analysis. Even though industry and the scientific community demand experts with expertise in hardware reverse engineering, there is a lack of educational offerings, and existing training is almost entirely unstructured and on the job. To the best of our knowledge, we have developed the first course to systematically teach students hardware reverse engineering based on insights from the fields of educational research, cognitive science, and hardware security. The contribution of our work is threefold: (1) we propose underlying educational guidelines for practice-oriented courses which teach hardware reverse engineering; (2) we develop such a lab course with a special focus on gate-level netlist reverse engineering and provide the required tools to support it; (3) we conduct an educational evaluation of our pilot course. Based on our results, we provide valuable insights on the structure and content necessary to design and teach future courses on hardware reverse engineering.
Author Fyrbiak, Marc
Wiesen, Carina
Albartus, Nils
Rummel, Nikol
Becker, Steffen
Elson, Malte
Paar, Christof
Author_xml – sequence: 1
  givenname: Carina
  surname: Wiesen
  fullname: Wiesen, Carina
  email: carina.wiesen@rub.de
  organization: Educ. Res. Inst., Ruhr-Univ. Bochum, Bochum, Germany
– sequence: 2
  givenname: Steffen
  surname: Becker
  fullname: Becker, Steffen
  email: steffen.becker@rub.de
  organization: Horst Gortz Inst. for IT Security,Ruhr-Univ. Bochum, Bochum, Germany
– sequence: 3
  givenname: Marc
  surname: Fyrbiak
  fullname: Fyrbiak, Marc
  email: marc.fyrbiak@rub.de
  organization: Horst Gortz Inst. for IT Security, Security Ruhr-Univ. Bochum, Bochum, Germany
– sequence: 4
  givenname: Nils
  surname: Albartus
  fullname: Albartus, Nils
  email: nils.albartus@rub.de
  organization: Horst Gortz Inst. for IT Security, Security Ruhr-Univ. Bochum, Bochum, Germany
– sequence: 5
  givenname: Malte
  surname: Elson
  fullname: Elson, Malte
  email: malte.elson@rub.de
  organization: Educ. Res. Inst., Ruhr-Univ. Bochum, Bochum, Germany
– sequence: 6
  givenname: Nikol
  surname: Rummel
  fullname: Rummel, Nikol
  email: nikol.rummel@rub.de
  organization: Educ. Res. Inst., Ruhr-Univ. Bochum, Bochum, Germany
– sequence: 7
  givenname: Christof
  surname: Paar
  fullname: Paar, Christof
  email: christof.paar@rub.de
  organization: Horst Gortz Inst. for IT Security, Security Ruhr-Univ. Bochum, Bochum, Germany
BookMark eNot0FFLwzAUBeAoCs65HyC-5A903iRNm_o2Rt0GBUXq87hNbrfIzCTpFP-9Bfd0DnxwHs4tuwrHQIzdC5gLAdVju2jquQRh5qYQWpZwwWZVaYRWpii0lHDJJjIvISuKytywWUofACALk0slJqxtCe3ehx1fY3Q_GIm_0TfFRLwOOx-I4ohPvHYni4M_Bjzw1ck7OoyWOAbHXyPawdsRNiH53X5Id-y6x0Oi2Tmn7P25bpfrrHlZbZaLJvOi1ENWdWBRCQAhOwRXujLvRUfYCdurEqAyCEBjN6hNrq3qpdCOrBKml0C9mrKH_11PRNuv6D8x_m7PP6g_sQRTmg
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/TALE.2018.8615270
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
Accès UT - IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Education
EISBN 9781538665220
1538665220
EISSN 2470-6698
EndPage 445
ExternalDocumentID 8615270
Genre orig-research
GroupedDBID 6IE
6IF
6IL
6IN
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-9b0ca310012ba0d7d74f1beab1cf370098a00ecf38a5845c3f215dec318f20ef3
IEDL.DBID RIE
IngestDate Wed Aug 27 02:47:01 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-9b0ca310012ba0d7d74f1beab1cf370098a00ecf38a5845c3f215dec318f20ef3
PageCount 8
ParticipantIDs ieee_primary_8615270
PublicationCentury 2000
PublicationDate 2018-Dec.
PublicationDateYYYYMMDD 2018-12-01
PublicationDate_xml – month: 12
  year: 2018
  text: 2018-Dec.
PublicationDecade 2010
PublicationTitle 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE)
PublicationTitleAbbrev TALE
PublicationYear 2018
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0002684231
ssj0003203504
Score 1.7818654
Snippet Since underlying hardware components form the basis of trust in virtually any computing system, security failures in hardware pose a devastating threat to our...
SourceID ieee
SourceType Publisher
StartPage 438
SubjectTerms Education
educational guidelines
Guidelines
Hardware
hardware reverse engineering
Logic gates
Reverse engineering
Security
Title Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights
URI https://ieeexplore.ieee.org/document/8615270
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEF1qT3pR24rf7MGjSZPmc72JtFaxIpJCb2V2MwuipNImCP56d5I0VvHgbRPCsuwsmdl5b94wdiECGUuAkCyAlq_BsYR2A8t4bkiFjCFUVOA8eQzHU_9-Fsxa7LKphUHEknyGNg1LLD9dqIJSZf04pCas5oK-ZY5ZVavV5FNItWSNaNGzNyDMzK-BTNcR_eT6YUhcrtiu5_nRUKX0J6NdNlmvpKKRvNpFLm31-Uuk8b9L3WO978o9_tT4pH3WwqxDnZlrFkeH7WwIEHZZktRkSk4I_gcskT8jETWQb3x3xZsJ4I3fFqSMRWx5DlnKK8EjY2l-l63opr_qselomNyMrbrPgvVigofcEtJRQIl-dyDBSaM08rUrEaSrtBeR4igYQ5pxDCZcCZSnTZyQojK_Az1wUHsHrJ0tMjxknFBaEaR-pCP0EUQshRShMjFBqJUb6SPWpb2av1dSGvN6m47_fn3CtsleFXvklLXzZYFnJgbI5Xlp_C90TrCN
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEF1KPagXta347R48mjRpPtebSGuqbRFJobeyu5kFUVJpEwR_vTtJGqt48LYJYVl2lszsvDdvCLlinggF5z5aAAxXcctgyvYM7bl5wkTIfYkFzuOJH03dh5k3a5DruhYGAAryGZg4LLD8ZCFzTJV1Qx-bsOoL-pb2-65XVmvVGRXULVljWvjs9BA1cyso07ZYN74d9ZHNFZrVTD9aqhQeZbBHxuu1lESSVzPPhCk_f8k0_nex-6TzXbtHn2qvdEAakLawN3PF42iR3Q0JwjaJ44pOSRHD_-BLoM-AVA2gG9_d0HoC_kbvc9TGQr485WlCS8kjbWs6TFd41191yHTQj-8io-q0YLzo8CEzmLAkx1S_3RPcSoIkcJUtgAtbKidAzVGuTanHIdcBiycdpSOFBKT-IaieBco5JM10kcIRoYjTMi9xAxWAC5yFggnmSx0V-EragTombdyr-XsppjGvtunk79eXZDuKx6P5aDh5PCU7aLuSS3JGmtkyh3MdEWTiojgIX-KNs9o
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2018+IEEE+International+Conference+on+Teaching%2C+Assessment%2C+and+Learning+for+Engineering+%28TALE%29&rft.atitle=Teaching+Hardware+Reverse+Engineering%3A+Educational+Guidelines+and+Practical+Insights&rft.au=Wiesen%2C+Carina&rft.au=Becker%2C+Steffen&rft.au=Fyrbiak%2C+Marc&rft.au=Albartus%2C+Nils&rft.date=2018-12-01&rft.pub=IEEE&rft.eissn=2470-6698&rft.spage=438&rft.epage=445&rft_id=info:doi/10.1109%2FTALE.2018.8615270&rft.externalDocID=8615270