Sciweavers

ASPDAC
2016
ACM

Netlist reverse engineering for high-level functionality reconstruction

8 years 8 months ago
Netlist reverse engineering for high-level functionality reconstruction
Abstract— In a modern IC design flow, from specification development to chip fabrication, various security threats are emergent. Of particular concern are modifications made to third-party IP cores and commercial off-the-shelf (COTS) chips where no golden models are available for comparisons. Toward this direction, we develop a tool, named Reverse Engineering Finite State Machine (REFSM), that helps end-users reconstruct a high-level description of the control logic from a flattened netlist. We demonstrate that REFSM effectively recovers circuit control logic from netlists with varying degrees of complexity. Experimental results also showed that the developed tool can easily identify malicious logic from a flattened (or even obfuscated) netlist. If combined with chip level reverse engineering techniques, the developed REFSM tool can help detect the insertion of hardware Trojans in fabricated circuits.
Travis Meade, Shaojie Zhang, Yier Jin
Added 29 Mar 2016
Updated 29 Mar 2016
Type Journal
Year 2016
Where ASPDAC
Authors Travis Meade, Shaojie Zhang, Yier Jin
Comments (0)