[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article
Public Access

Hardware Trust and Assurance through Reverse Engineering: A Tutorial and Outlook from Image Analysis and Machine Learning Perspectives

Published: 30 June 2021 Publication History

Abstract

In the context of hardware trust and assurance, reverse engineering has been often considered as an illegal action. Generally speaking, reverse engineering aims to retrieve information from a product, i.e., integrated circuits (ICs) and printed circuit boards (PCBs) in hardware security-related scenarios, in the hope of understanding the functionality of the device and determining its constituent components. Hence, it can raise serious issues concerning Intellectual Property (IP) infringement, the (in)effectiveness of security-related measures, and even new opportunities for injecting hardware Trojans. Ironically, reverse engineering can enable IP owners to verify and validate the design. Nevertheless, this cannot be achieved without overcoming numerous obstacles that limit successful outcomes of the reverse engineering process. This article surveys these challenges from two complementary perspectives: image processing and machine learning. These two fields of study form a firm basis for the enhancement of efficiency and accuracy of reverse engineering processes for both PCBs and ICs. In summary, therefore, this article presents a roadmap indicating clearly the actions to be taken to fulfill hardware trust and assurance objectives.

References

[1]
Jason Abt and Chris Pawlowicz. 2012. Circuit Analysis Techniques: Delayering and Circuit Vision. Retrieved from http://www.techinsights.com/.
[2]
Nitin Aggarwal and W. Clem Karl. 2006. Line detection in images through regularized Hough transform. IEEE Trans. Image Process. 15, 3 (2006), 582–591.
[3]
Haroon Ahmed, Simon Blythe, and Beatrice Fraboni. 1993. Integrated circuit structure analysis. U.S. Patent 5,191,213.
[4]
C. Albrecht. 2005. Iwls 2005 benchmarks. Retrieved from http://www.iwls.org.
[5]
N. Arazm, A. Sahab, and M. F. Kazemi. 2017. Noise reduction of SEM images using adaptive Wiener filter. In Proceedings of the IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom’17). 50–55.
[6]
Navid Asadizanjani, Sina Shahbazmohamadi, Mark Tehranipoor, and Domenic Forte. 2015. Non-destructive PCB reverse engineering using x-ray micro computed tomography. In Proceedings of the 41st International Symposium for Testing and Failure Analysis. 1–5.
[7]
Navid Asadizanjani, Mark Tehranipoor, and Domenic Forte. 2017. PCB reverse engineering using nondestructive x-ray tomography and advanced image processing. IEEE Trans. Comp. Packag. Manufactur. Technol. 7, 2 (2017), 292–299.
[8]
Johanna Baehr, Alessandro Bernardini, Georg Sigl, and Ulf Schlichtmann. 2019. Machine learning and structural characteristics for reverse engineering. In Proceedings of the 24th Asia and South Pacific Design Automation Conference. ACM, 96–103.
[9]
Johanna Baehr, Alessandro Bernardini, Georg Sigl, and Ulf Schlichtmann. 2020. Machine learning and structural characteristics for reverse engineering. Integration 72 (2020), 1–12.
[10]
Chongxi Bao, Domenic Forte, and Ankur Srivastava. 2014. On application of one-class SVM to reverse engineering-based hardware Trojan detection. In Proceedings of the 15th International Symposium on Quality Electronic Design. IEEE, 47–54.
[11]
Chongxi Bao, Domenic Forte, and Ankur Srivastava. 2015. On reverse engineering-based hardware Trojan detection. IEEE Trans. Comput.-Aided Design Integr. Circ. Syst. 35, 1 (2015), 49–57.
[12]
Chongxi Bao, Domenic Forte, and Ankur Srivastava. 2016. On reverse engineering-based hardware Trojan detection. IEEE Trans. Comput.-Aided Design Integr. Circ. Syst. 35, 1 (2016), 49–57.
[13]
Chongxi Bao, Yang Xie, Yuntao Liu, and Ankur Srivastava. 2018. Reverse engineering-based hardware trojan detection. In The Hardware Trojan War. Springer, 269–288.
[14]
Christopher F. Batten. 2000. Autofocusing and astigmatism correction in the scanning electron microscope. Mphill thesis, University of Cambridge (2000).
[15]
Csaba Benedek, Olivér Krammer, Mihály Janóczki, and László Jakab. 2012. Solder paste scooping detection by multilevel visual inspection of printed circuit boards. IEEE Trans. Industr. Electron. 60, 6 (2012), 2318–2331.
[16]
Simon Blythe, Beatrice Fraboni, Sanjay Lall, Haroon Ahmed, and Ugo de Riu. 1993. Layout reconstruction of complex silicon chips. IEEE J. Solid-state Circ. 28, 2 (1993), 138–145.
[17]
F. Edward Boas and Dominik Fleischmann. 2012. CT artifacts: Causes and reduction techniques. Imag. Med. 4, 2 (2012), 229–240.
[18]
Ulbert J. Botero, Navid Asadizanjani, Damon L. Woodard, and Domenic Forte. 2020. A framework for automated alignment and layer identification of X-Ray tomography imaged PCBs. In Proceedings of the Annual GOMACTech Conference.
[19]
Ulbert J. Botero, Fatemeh Ganji, Navid Asadizanjani, Damon Woodard, and Domenic Forte. 2020. Semi-Supervised automated layer identification of X-ray tomography imaged PCBs. In Proceedings of the International Conference on Physical Assurance and Inspection of Electronics (PAINE’20). IEEE.
[20]
Ulbert J. Botero, David Koblah, Daniel Capecci, Fatemeh Ganji, Navid Asadizanjani, Damon Woodard, and Domenic Forte. 2020. Automated via detection for PCB reverse engineering. In Proceedings of the International Symposium for Testing and Failure Analysis. ASM.
[21]
Ulbert J. Botero, Mark M. Tehranipoor, and Domenic Forte. 2019. Upgrade/Downgrade: Efficient and secure legacy electronic system replacement. IEEE Design Test 36, 1 (2019), 14–22.
[22]
Nikolaos G. Bourbakis, A. Mogzadeh, S. Mertoguno, and Cris Koutsougeras. 2002. A knowledge-based expert system for automatic visual VLSI reverse-engineering: VLSI layout version. IEEE Trans. Syst., Man, Cybernet.—Part A: Syst. Hum. 32, 3 (2002), 428–436.
[23]
David C. Bowman. 2018. Image stitching and matching tool in the automated iterative reverse engineer (AIRE) integrated circuit analysis suite. https://corescholar.libraries.wright.edu/cgi/viewcontent.cgi?article=3142&context=etd_all.
[24]
Matthew Brown and David G. Lowe. 2007. Automatic panoramic image stitching using invariant features. Int. J. Comput. Vision 74, 1 (2007), 59–73.
[25]
Burçin Cakır and Sharad Malik. 2015. Hardware Trojan detection for gate-level ICs using signal correlation based clustering. In Proceedings of the Design, Automation and Test in Europe Conference and Exhibition (DATE’15). IEEE, 471–476.
[26]
Burcin Cakir and Sharad Malik. 2018. Reverse engineering digital ICs through geometric embedding of circuit graphs. ACM Trans. Design Autom. Electr. Syst. 23, 4 (2018), 1–19.
[27]
Stephan De Castro, Jean-Max Dutertre, Bruno Rouzeyre, Giorgio Di Natale, and Marie-Lise Flottes. 2016. Frontside versus backside laser injection: a comparative study. ACM J. Emerg. Technol. Comput. Syst. 13, 1 (2016), 1–15.
[28]
Rajat Subhra Chakraborty, Francis Wolff, Somnath Paul, Christos Papachristou, and Swarup Bhunia. 2009. MERO: A statistical approach for hardware Trojan detection. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 396–410.
[29]
Wei-Hsin Chang, Shuenn-Der Tzeng, and Chen-Yi Lee. 2001. A novel subcircuit extraction algorithm by recursive identification scheme. In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS’01), Vol. 5. IEEE, 491–494.
[30]
Narendra Chaudhary, Serap A. Savari, and Sai S. Yeddulapalli. 2019. Line roughness estimation and Poisson denoising in scanning electron microscope images using deep learning. J. Micro/Nanolithogr., MEMS, MOEMS 18, 2 (2019), 024001.
[31]
Vikas Chaudhary, Ishan R. Dave, and Kishor P. Upla. 2017. Automatic visual inspection of printed circuit board for defect detection and classification. In Proceedings of the International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET’17). IEEE, 732–737.
[32]
Rasika R. Chavan, Swati A. Chavan, Gautami D. Dokhe, Mayuri B. Wagh, and Archana S. Vaidya. 2016. Quality control of PCB using image processing. Int. J. Comput. Appl. 975 (2016), 8887.
[33]
Jinghui Chen, Chen Dong, Fan Zhang, and Guorong He. 2019. A hardware-trojans detection approach based on eXtreme gradient boosting. In Proceedings of the IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET’19). IEEE, 69–73.
[34]
Deruo Cheng, Yiqiong Shi, Bah-Hwee Gwee, Kar-Ann Toh, and Tong Lin. 2018. A hierarchical multiclassifier system for automated analysis of delayered IC Images. IEEE Intell. Syst. 34, 2 (2018), 36–43.
[35]
Deruo Cheng, Yiqiong Shi, Tong Lin, Bah-Hwee Gwee, and Kar-Ann Toh. 2018. Hybrid K-Means clustering and support vector machine method for via and metal line detections in delayered IC images. IEEE Trans. Circ. Syst. II: Express Briefs 65, 12 (2018), 1849–1853.
[36]
Deruo Cheng, Yiqiong Shi, Tong Lin, Bah-Hwee Gwee, and Kar-Ann Toh. 2019. Global template projection and matching method for training-free analysis of delayered IC images. In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS’19). IEEE, 1–5.
[37]
D. Cheremisinov and L. Cheremisinova. 2020. Subcircuit pattern recognition in transistor level circuits. Pattern Recogn. Image Anal. 30, 2 (2020), 160–169.
[38]
Gregory H. Chisholm, Steven T. Eckmann, Christopher M. Lain, and Robert L. Veroff. 1999. Understanding integrated circuits. IEEE Design Test Comput. 16, 2 (1999), 26–37.
[39]
Petr Cizmar, András E. Vladár, Bin Ming, Michael T. Postek, and National Institute of Standards and Technology. 2008. Simulated SEM images for resolution measurement. Scanning 30, 5 (2008), 381–391.
[40]
Petr Cizmar, András E. Vladár, and Michael T. Postek. 2009. Optimization of accurate SEM imaging by use of artificial images. In Scanning Microscopy 2009, Vol. 7378. International Society for Optics and Photonics, 737815.
[41]
Ronald P. Cocchi, James P. Baukus, Lap Wai Chow, and Bryan J. Wang. 2014. Circuit camouflage integration for hardware IP protection. In Proceedings of the 51st Annual Design Automation Conference. ACM, 1–5.
[42]
Senate Armed Services Committee. 2012. Inquiry into counterfeit electronic parts in the department of defense supply chain. Washington, DC.
[43]
Vassilios Constantoudis, Vijaya-Kumar Murugesan Kuppuswamy, and Evangelos Gogolides. 2013. Effects of image noise on contact edge roughness and critical dimension uniformity measurement in synthesized scanning electron microscope images. J. Micro/Nanolithogr., MEMS, MOEMS 12, 1 (2013), 013005.
[44]
Franck Courbon. 2019. Practical partial hardware reverse engineering analysis. J. Hardw. Syst. Secur. 4, 1 (2019), 1–10.
[45]
Franck Courbon, Philippe Loubet-Moundi, Jacques J. A. Fournier, and Assia Tria. 2015. A high efficiency hardware trojan detection technique based on fast SEM imaging. In Proceedings of the Design, Automation and Test in Europe Conference and Exhibition. EDA Consortium, 788–793.
[46]
Franck Courbon, Philippe Loubet-Moundi, Jacques J. A. Fournier, and Assia Tria. 2015. SEMBA: A SEM based acquisition technique for fast invasive Hardware Trojan detection. In Proceedings of the European Conference on Circuit Theory and Design (ECCTD’15). IEEE, 1–4.
[47]
Franck Courbon, Sergei Skorobogatov, and Christopher Woods. 2016. Reverse engineering flash EEPROM memories using scanning electron microscopy. In Proceedings of the International Conference on Smart Card Research and Advanced Applications. Springer, 57–72.
[48]
Navneet Dalal and Bill Triggs. 2005. Histograms of oriented gradients for human detection. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05), Vol. 1. IEEE, 886–893.
[49]
Piali Das, Olga Veksler, Vyacheslav Zavadsky, and Yuri Boykov. 2009. Semiautomatic segmentation with compact shape prior. Image Vision Comput. 27, 1–2 (2009), 206–219.
[50]
Neelum Dave, Vikas Tambade, Balaji Pandhare, and Suman Saurav. 2016. PCB defect detection using image processing and embedded system. Int. Res. J. Eng. Technol. 3, 5 (2016), 1897–1901.
[51]
Alexander Doudkin, Alexander Inyutin, and Maksim Vatkin. 2005. Objects identification on the color layout images of the integrated circuit layers. In Proceedings of the IEEE Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications. IEEE, 610–614.
[52]
Roger Durà, Jofre Pallarès, Raúl Quijada, Xavier Formatjé, Salvador Hidalgo, and Francisco Serra-Graells. 2017. fast and robust Topology-Based logic gate identification for automated IC reverse engineering. In Proceedings of the 43rd International Symposium for Testing and Failure Analysis (ISTFA’17). ASM International, 299.
[53]
Mohamed El Massad, Siddharth Garg, and Mahesh V. Tripunitara. 2015. Integrated circuit (IC) Decamouflaging: Reverse engineering camouflaged ICs within minutes. In Proceedings of the (NDSS’15). 1–14.
[54]
Rana Elnaggar and Krishnendu Chakrabarty. 2018. Machine learning for hardware security: Opportunities and risks. J. Electron. Test. 34, 2 (2018), 183–201.
[55]
Luděk Frank. 2005. Noise in secondary electron emission: the low yield case. J. Electron Microsc. 54, 4 (2005), 361–365.
[56]
PDK Free. [n.d.]. 45nm open-access based PDK for the 45nm technology node. https://research.ece.ncsu.edu/eda/freepdk/freepdk45/.
[57]
Sean P. Frigo, Zachary H. Levine, and Nestor J. Zaluzec. 2002. Submicron imaging of buried integrated circuit structures using scanning confocal electron microscopy. Appl. Phys. Lett. 81, 11 (2002), 2112–2114.
[58]
Chang-Wen Fu, Ge-Xin Zeng, De-Sheng Qiu, and Hui-Zhang Wang. 2007. System and method for generating a bill of material file. U.S. Patent App. 11/309,173.
[59]
Marc Fyrbiak. 2019. Constructive and destructive reverse engineering aspects of digital systems.Ph.D. Dissertation. Ruhr University Bochum, Germany.
[60]
Marc Fyrbiak, Sebastian Strauß, Christian Kison, Sebastian Wallat, Malte Elson, Nikol Rummel, and Christof Paar. 2017. Hardware reverse engineering: Overview and open challenges. In Proceedings of the IEEE 2nd International Verification and Security Workshop (IVSW’17). IEEE, 88–94.
[61]
Vilas H. Gaidhane, Yogesh V. Hote, and Vijander Singh. 2018. An efficient similarity measure approach for PCB surface defect detection. Pattern Anal. Appl. 21, 1 (2018), 277–289.
[62]
Sumyung Gang, Ndayishimiye Fabrice, and JoonJae Lee. 2020. Coresets for PCB character recognition based on deep learning. In Proceedings of the International Conference on Artificial Intelligence in Information and Communication (ICAIIC’20). IEEE, 637–642.
[63]
Swaroop Ghosh, Abhishek Basak, and Swarup Bhunia. 2014. How secure are printed circuit boards against trojan attacks?IEEE Design Test 32, 2 (2014), 7–16.
[64]
E. Giannatou, G. Papavieros, V. Constantoudis, H. Papageorgiou, and E. Gogolides. 2019. Deep learning denoising of SEM images towards noise-reduced LER measurements. Microelectron. Eng. 216 (2019), 111051.
[65]
Richard Goldman, Karen Bartleson, Troy Wood, Kevin Kranen, C. Cao, Vazgen Melikyan, and Gayane Markosyan. 2009. Synopsys’ open educational design kit: capabilities, deployment and future. In Proceedings of the IEEE International Conference on Microelectronic Systems Education. IEEE, 20–24.
[66]
R. Goldman, K. Bartleson, T. Wood, K. Kranen, V. Melikyan, and E. Babayan. 2013. 32/28nm educational design kit: Capabilities, deployment and future. In Proceedings of the IEEE Asia Pacific Conference on Postgraduate Research in Microelectronics and Electronics (PrimeAsia). IEEE, 284–288.
[67]
Hector Gomez, Ckristian Duran, and Elkim Roa. 2018. Standard cell camouflage method to counter silicon reverse engineering. In Proceedings of the IEEE International Conference on Consumer Electronics (ICCE’18). IEEE, 1–4.
[68]
Hector Gomez, Ckristian Duran, and Elkim Roa. 2019. defeating silicon reverse engineering using a layout-level standard cell camouflage. IEEE Trans. Consum. Electron. 65, 1 (2019), 109–118.
[69]
Joe Grand. 2014. Printed circuit board deconstruction techniques. In Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT’14).
[70]
Peng Gu, Dylan Stow, Prashansa Mukim, Shuangchen Li, and Yuan Xie. 2018. Cost-efficient 3D integration to hinder reverse engineering during and after manufacturing. In Proceedings of the Asian Hardware Oriented Security and Trust Symposium (AsianHOST’18). IEEE, 74–79.
[71]
Ujjwal Guin, Daniel DiMase, and Mohammad Tehranipoor. 2014. Counterfeit integrated circuits: detection, avoidance, and the challenges ahead. J. Electron. Test. 30, 1 (2014), 9–23.
[72]
Zimu Guo, Mark Tehranipoor, Domenic Forte, and Jia Di. 2015. Investigation of obfuscation-based anti-reverse engineering for printed circuit boards. In Proceedings of the 52nd ACM/EDAC/IEEE Design Automation Conference (DAC’15). IEEE, 1–6.
[73]
Mark C. Hansen, Hakan Yalcin, and John P. Hayes. 1999. Unveiling the ISCAS-85 benchmarks: A case study in reverse engineering. IEEE Design Test Comput. 16, 3 (1999), 72–80.
[74]
L. R. Harriott, A. Wagner, and F. Fritz. 1986. Integrated circuit repair using focused ion beam milling. J. Vacuum Sci. Technol. B: Microelectron. Process. Phenom. 4, 1 (1986), 181–184.
[75]
Kento Hasegawa, Masaru Oya, Masao Yanagisawa, and Nozomu Togawa. 2016. Hardware Trojans classification for gate-level netlists based on machine learning. In Proceedings of the IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS’16). IEEE, 203–206.
[76]
Kento Hasegawa, Masao Yanagisawa, and Nozomu Togawa. 2017. Hardware Trojans classification for gate-level netlists using multi-layer neural networks. In Proceedings of the IEEE 23rd International Symposium on On-Line Testing and Robust System Design (IOLTS’17). IEEE, 227–232.
[77]
Kento Hasegawa, Masao Yanagisawa, and Nozomu Togawa. 2017. Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classifier. In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS’17). IEEE, 1–4.
[78]
Abdel-Aziz I. M. Hassanin, Fathi E. Abd El-Samie, and Ghada M. El Banby. 2019. A real-time approach for automatic defect detection from PCBs based on SURF features and morphological operations. Multimedia Tools Appl. 78, 24 (2019), 34437–34457.
[79]
Kaiming He, Georgia Gkioxari, Piotr Dollár, and Ross Girshick. 2017. Mask r-cnn. In Proceedings of the IEEE International Conference on Computer Vision. 2961–2969.
[80]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Identity mappings in deep residual networks. In Proceedings of the European Conference on Computer Vision. Springer, 630–645.
[81]
Mirko Holler, Manuel Guizar-Sicairos, Esther H. R. Tsai, Roberto Dinapoli, Elisabeth Müller, Oliver Bunk, Jörg Raabe, and Gabriel Aeppli. 2017. High-resolution non-destructive three-dimensional imaging of integrated circuits. Nature 543, 7645 (2017), 402.
[82]
Xuenong Hong, Deruo Cheng, Yiqiong Shi, Tong Lin, and Bah Hwee Gwee. 2018. Deep learning for automatic IC image analysis. In Proceedings of the IEEE 23rd International Conference on Digital Signal Processing (DSP’18). IEEE, 1–5.
[83]
Szu-Hao Huang and Ying-Cheng Pan. 2015. Automated visual inspection in the semiconductor industry: A survey. Comput. Industry 66 (2015), 1–10.
[84]
Xingjia Huang, Shengcong Zhu, Xuanyu Huang, Bing Su, Changping Ou, and Weili Zhou. 2015. Detection of plated through hole defects in printed circuit board with X-ray. In Proceedings of the 16th International Conference on Electronic Packaging Technology (ICEPT’15). IEEE, 1296–1301.
[85]
Taswar Iqbal and Kai-Dietrich Wolf. 2017. PCB surface fingerprints based counterfeit detection of electronic devices. Electronic Imag. 2017, 7 (2017), 144–149.
[86]
Girishma Jain, Sandeep Raghuwanshi, and Gagan Vishwakarma. 2017. Hardware Trojan: Malware detection using reverse engineering and SVM. In Proceedings of the International Conference on Intelligent Systems Design and Applications. Springer, 530–539.
[87]
Sang-Hun Jin. 2000. Method for transforming original bill-of-material for printed circuit board into standard bill-of-material. U.S. Patent 6,041,268.
[88]
Yier Jin, Nathan Kupp, and Yiorgos Makris. 2009. Experiences in hardware Trojan design and implementation. In Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust. IEEE, 50–57.
[89]
Yier Jin and Yiorgos Makris. 2008. Hardware Trojan detection using path delay fingerprint. In Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust. IEEE, 51–57.
[90]
Q. Kai, C. Jian, L. Zhongguo, et al. 2016. Automatic printed circuit board wire detecting method of cone beam CT image. Opt. Precis. Eng. 24, 2 (2016), 413–421.
[91]
Heikki Kälviäinen, Petri Hirvonen, Lei Xu, and Erkki Oja. 1995. Comparisons of probabilistic and non-probabilistic hough transforms. In Computer Vision (ECCV’94), Jan-Olof Eklundh (Ed.). Springer Berlin Heidelberg, 350–360.
[92]
Nidal S. Kamel and K. S. Sim. 2004. Image signal-to-noise ratio and noise variance estimation using autoregressive model. Scan. J. Scan. Microsc. 26, 6 (2004), 277–281.
[93]
Michael Kass, Andrew Witkin, and Demetri Terzopoulos. 1988. Snakes: Active contour models. Int. J. Comput. Vision 1, 4 (1988), 321–331.
[94]
Beant Kaur, Gurmeet Kaur, and Amandeep Kaur. 2014. Detection and classification of printed circuit board defects using image subtraction method. In Proceedings of the Conference on Recent Advances in Engineering and Computational Sciences (RAECS’14). IEEE, 1–5.
[95]
Anna Lena Keller, Dirk Zeidler, and Thomas Kemen. 2014. High throughput data acquisition with a multi-beam SEM. In Scanning Microscopies 2014, Vol. 9236. International Society for Optics and Photonics, 92360B.
[96]
K. Yu Kenneth and C. Neil Berglund. 1992. Automated system for extracting design and layout information from an integrated circuit. U.S. Patent 5,086,477.
[97]
Shahrzad Keshavarz, Cunxi Yu, Samaneh Ghandali, Xiaolin Xu, and Daniel Holcomb. 2018. Survey on applications of formal methods in reverse engineering and intellectual property protection. J. Hardw. Syst. Secur. 2, 3 (2018), 214–224.
[98]
Gyungtae Kim, Ming Ma, and Inhag Park. 2018. A fast and flexible software for IC reverse engineering. In Proceedings of the International Conference on Electronics, Information, and Communication (ICEIC’18). IEEE, 1–4.
[99]
Jun-Oh Kim, Youn-Ae Lee, and Tae-Hyoung Park. 2012. Automatic extraction of component inspection regions from printed circuit board. In Proceedings of the IEEE/SICE International Symposium on System Integration (SII’12). IEEE, 871–876.
[100]
Adam Kimura, Jon Scholl, James Schaffranek, Matthew Sutter, Andrew Elliott, Mike Strizich, and Glen David Via. 2020. A decomposition workflow for integrated circuit verification and validation. J. Hardw. Syst. Secur. (2020), 1–10.
[101]
Christian Kison. 2019. Advanced methods for hardware reverse engineering. Ph.D. Dissertation. Ruhr-Universität Bochum.
[102]
Johann Knechtel. 2020. Hardware security for and beyond CMOS technology: An overview on fundamentals, applications, and challenges. Retrieved from https://arXiv:2001.08780.
[103]
Johann Knechtel, Satwik Patnaik, and Ozgur Sinanoglu. 2019. Protect your chip design intellectual property: An overview. In Proceedings of the International Conference on Omni-Layer Intelligent Systems. 211–216.
[104]
Stephen Kockentiedt, Klaus Tönnies, Erhardt Gierke, Nico Dziurowitz, Carmen Thim, and Sabine Plitzko. 2013. Poisson shot noise parameter estimation from a single scanning electron microscopy image. In Image Processing: Algorithms and Systems XI, Vol. 8655. International Society for Optics and Photonics, 86550N.
[105]
Jin Won Koh, Gu Teak Hwang, Moon Seop Hyun, Jun-Mo Yang, and Jeoung Woo Kim. 2011. Semiconductor layer extraction techniques by SEM. In Proceedings of the 18th IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA’11). IEEE, 1–3.
[106]
Kishor Kunal, Tonmoy Dhar, Meghna Madhusudan, Jitesh Poojary, A. K. Sharma, Wenbin Xu, Steven M. Burns, Jiang Hu, Ramesh Harjani, and Sachin S. Sapatnekar. 2020. GANA: Graph convolutional network based automated netlist annotation for analog circuits. In Proceedings of the Design, Automation and Test in Europe Conference and Exhibition (DATE’20).
[107]
Chia-Wen Kuo, Jacob Ashmore, David Huggins, and Zsolt Kira. 2019. Data-efficient graph embedding learning for PCB component detection. In Proceedings of the IEEE Winter Conference on Applications of Computer Vision (WACV’19). IEEE, 551–560.
[108]
Dmitry Lagunovsky, Sergey Ablameyko, and M. Kutas. 1998. Recognition of integrated circuit images in reverse engineering. In Proceedings of the 14th International Conference on Pattern Recognition, Vol. 2. IEEE, 1640–1642.
[109]
S. H. Lau, Andrei Tkachuk, Michael Feser, Hongtao Cui, Fred Duewer, Wenbing Yun, and David Vallet. 2006. Non destructive failure analysis technique with a laboratory based 3D X-ray nanotomography system. In Proceedings of the LSI Testing Symposium.
[110]
A. Lazar and Petru S. Fodor. 2015. Sparsity based noise removal from low dose scanning electron microscopy images. In Computational Imaging XIII, Vol. 9401. International Society for Optics and Photonics, 940105.
[111]
Svetlana Lazebnik, Cordelia Schmid, and Jean Ponce. 2006. Beyond bags of features: Spatial pyramid matching for recognizing natural scene categories. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’06). 2169–2178. https://doi.org/10.1109/CVPR.2006.68
[112]
Yann LeCun, Fu Jie Huang, Leon Bottou, et al. 2004. Learning methods for generic object recognition with invariance to pose and lighting. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’04). Citeseer, 97–104.
[113]
Jang Hee Lee and Suk In Yoo. 2008. An effective image segmentation technique for the SEM image. In Proceedings of the IEEE International Conference on Industrial Technology. IEEE, 1–5.
[114]
Myungjun Lee, Jason Cantone, Ji Xu, Lei Sun, and Ryoung-han Kim. 2014. Improving SEM image quality using pixel super resolution technique. In Metrology, Inspection, and Process Control for Microlithography XXVIII, Vol. 9050. International Society for Optics and Photonics, 90500U.
[115]
Fabiana R. Leta, Flávio F. Feliciano, and Flavius P. R. Martins. 2008. Computer vision system for printed circuit board inspection. In Proceedings of the ABCM Symposium Series in Mechatronics, Vol. 3. 623–632.
[116]
Zachary H. Levine, Andrew R. Kalukin, Sean P. Frigo, Ian McNulty, and Markus Kuhn. 1999. Tomographic reconstruction of an integrated circuit interconnect. Appl. Phys. Lett. 74, 1 (1999), 150–152.
[117]
He Li, Qiang Liu, and Jiliang Zhang. 2016. A survey of hardware Trojan threat and defense. Integration 55 (2016), 426–437.
[118]
Wenchao Li, Adria Gascon, Pramod Subramanyan, Wei Yang Tan, Ashish Tiwari, Sharad Malik, Natarajan Shankar, and Sanjit A. Seshia. 2013. Wordrev: Finding word-level structures in a sea of bit-level gates. In Proceedings of the IEEE International Symposium on Hardware-oriented Security and Trust (HOST’13). IEEE, 67–74.
[119]
Wei Li, Stefan Neullens, Matthias Breier, Marcel Bosling, Thomas Pretz, and Dorit Merhof. 2014. Text recognition for information retrieval in images of printed circuit boards. In Proceedings of the 40th Annual Conference of the IEEE Industrial Electronics Society (IECON’14). IEEE, 3487–3493.
[120]
Wenchao Li, Zach Wasson, and Sanjit A. Seshia. 2012. Reverse engineering circuits using behavioral pattern mining. In Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust. IEEE, 83–88.
[121]
Konstantinos G. Liakos, Georgios K. Georgakilas, Serafeim Moustakidis, Patrik Karlsson, and Fotis C. Plessas. 2019. machine learning for hardware trojan detection: A review. In Proceedings of the Panhellenic Conference on Electronics & Telecommunications (PACET’19). IEEE, 1–6.
[122]
Tsung-Yi Lin, Michael Maire, Serge Belongie, James Hays, Pietro Perona, Deva Ramanan, Piotr Dollár, and C. Lawrence Zitnick. 2014. Microsoft coco: Common objects in context. In Proceedings of the European Conference on Computer Vision. Springer, 740–755.
[123]
Bernhard Lippmann, Niklas Unverricht, Aayush Singla, Matthias Ludwig, Michael Werner, Peter Egger, Anja Duebotzky, Helmut Graeb, Horst Gieser, Martin Rasche, et al. 2020. Verification of physical designs using an integrated reverse engineering flow for nanoscale technologies. Integration 71 (2020), 11–29.
[124]
Bernhard Lippmann, Michael Werner, Niklas Unverricht, Aayush Singla, Peter Egger, Anja Dübotzky, Horst Gieser, Martin Rasche, Oliver Kellermann, and Helmut Graeb. 2019. Integrated flow for reverse engineering of nanoscale technologies. In Proceedings of the 24th Asia and South Pacific Design Automation Conference. ACM, 82–89.
[125]
Xifeng Liu and Yuwei Hu. 2018. Automatic extraction of via in the CT image of PCB. In Proceedings of the 9th International Conference on Graphic and Image Processing (ICGIP’17), Vol. 10615. International Society for Optics and Photonics, 106154J.
[126]
Bin Ma, Timo Zimmermann, Manfred Rohde, Simon Winkelbach, Feng He, Werner Lindenmaier, and Kurt E. J. Dittmar. 2007. Use of autostitch for automatic stitching of microscope images. Micron 38, 5 (2007), 492–499.
[127]
Kaleel Mahmood, Pedro Latorre Carmona, Sina Shahbazmohamadi, Filiberto Pla, and Bahram Javidi. 2015. Real-time automated counterfeit integrated circuit detection using X-ray microscopy. Appl. Optics 54, 13 (2015), D25–D32.
[128]
Raman Maini and Himanshu Aggarwal. 2009. Study and comparison of various image edge detection techniques. Int. J. Image Process. 3, 1 (2009), 1–11.
[129]
D. W. Malone and R. E. Hummel. 1997. Electromigration in integrated circuits. Crit. Rev. Solid State Mater. Sci. 22, 3 (1997), 199–238.
[130]
G. Masalskis, et al. 2008. Reverse engineering of CMOS integrated circuits. Elektronika ir elektrotechnika 88, 8 (2008), 25–28.
[131]
Erik Matlin, Motilal Agrawal, and David Stoker. 2014. Non-invasive recognition of poorly resolved integrated circuit elements. IEEE Trans. Info. Forensics Secur. 9, 3 (2014), 354–363.
[132]
Mohadeseh Mazhari and Reza P. R. Hasanzadeh. 2016. Suppression of noise in SEM images using weighted local hysteresis smoothing filter. Scanning 38, 6 (2016), 634–643.
[133]
Ian McLoughlin. 2008. Secure embedded systems: The threat of reverse engineering. In Proceedings of the 14th IEEE International Conference on Parallel and Distributed Systems. IEEE, 729–736.
[134]
Yoshihiro Midoh, Katsuyoshi Miura, Koji Nakamae, and Hiromu Fujioka. 2005. Statistical optimization of Canny edge detector for measurement of fine line patterns in SEM image. Measure. Sci. Technol. 16, 2 (2005), 477.
[135]
Madhav Moganti and Fikret Ercal. 1998. Segmentation of printed circuit board images into basic patterns. Comput. Vision Image Understand. 70, 1 (1998), 74–86.
[136]
Samuel K. Moore. 2018. This Tech Would Have Spotted the Secret Chinese Chip in Seconds. Retrieved from https://spectrum.ieee.org/riskfactor/computing/hardware/this-tech-would-have-spotted-the-secret-chinese-chip-in-seconds.
[137]
Ryo Nakagaki, Yuji Takagi, and Koji Nakamae. 2010. Automatic recognition of circuit patterns on semiconductor wafers from multiple scanning electron microscope images. Measure. Sci. Technol. 21, 8 (2010), 085501.
[138]
Seetharam Narasimhan, Xinmu Wang, Dongdong Du, Rajat Subhra Chakraborty, and Swarup Bhunia. 2011. TeSR: A robust temporal self-referencing approach for hardware Trojan detection. In Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust. IEEE, 71–74.
[139]
Abdurrahman A. Nasr and Mohamed Z. Abdulmageed. 2017. An Efficient reverse engineering hardware trojan detector using histogram of oriented gradients. J. Electronic Test. 33, 1 (2017), 93–105.
[140]
B. Naveen and K. S. Raghunathan. 1993. An automatic netlist-to-schematic generator. IEEE Design Test Comput. 10, 1 (1993), 36–41.
[141]
Karsten Nohl, David Evans, Starbug Starbug, and Henryk Plötz. 2008. Reverse-engineering a cryptographic RFID Tag. In Proceedings of the USENIX Security Symposium, Vol. 28.
[142]
OpenCores. 2012. OpenCores Oliscience. Retrieved from https://opencores.org/projects.
[143]
Ndubuisi G. Orji, Mustafa Badaroglu, Bryan M. Barnes, Carlos Beitia, Benjamin D. Bunday, Umberto Celano, Regis J. Kline, Mark Neisser, Y. Obeng, and A. E. Vladar. 2018. Metrology for the next generation of semiconductor devices. Nature Electron. 1, 10 (2018), 532–547.
[144]
OSU. [n.d.]. Oklahoma state university system on chip (soc) design flows. Retrieved from https://vlsiarch.ecen.okstate.edu/flow/.
[145]
James Pawley and Heide Schatten. 2007. Biological Low-voltage Scanning Electron Microscopy. Springer.
[146]
Jon R. Pearce and Duane C. Holmes. 1987. Noise contributions to feature dimension measurement in a scanning electron microscope (Sem). In Integrated Circuit Metrology, Inspection, & Process Control, Vol. 775. International Society for Optics and Photonics, 153–158.
[147]
Minxu Peng, John Murray-Bruce, Karl K. Berggren, and Vivek K. Goyal. 2020. Source shot noise mitigation in focused ion beam microscopy by time-resolved measurement. Ultramicroscopy (2020), 112948.
[148]
Gatan Prashanth Prasad. 2010. Preparation of a cross-sectional semiconductor IC device sample for SEM observation. Retrieved from https://analyticalscience.wiley.com/do/10.1002/micro.139/full/.
[149]
E. L. Principe, Navid Asadizanjani, Domenic Forte, Mark Tehranipoor, Robert Chivas, Michael DiBattista, Scott Silverman, Mike Marsh, Nicolas Piche, and John Mastovich. 2017. Steps toward automated deprocessing of integrated circuits. In Proceedings of the 43rd International Symposium for Testing and Failure Analysis (ISTFA’17). ASM International, 285.
[150]
Kai Qiao, Lei Zeng, Jian Chen, Jinjin Hai, and Bin Yan. 2018. Wire segmentation for printed circuit board using deep convolutional neural network and graph cut model. IET Image Process. 12, 5 (2018), 793–800.
[151]
Shahed E. Quadir, Junlin Chen, Domenic Forte, Navid Asadizanjani, Sina Shahbazmohamadi, Lei Wang, John Chandy, and Mark Tehranipoor. 2016. A survey on chip to system reverse engineering. ACM J. Emerg. Technol. Comput. Syst. 13, 1 (2016), 6.
[152]
Raul Quijada, Roger Dura, Jofre Pallares, Xavier Formatje, Salvador Hidalgo, and Francisco Serra-Graells. 2018. Large-area automated layout extraction methodology for Full-IC reverse engineering. J. Hardw. Syst. Secur. 2, 4 (2018), 322–332.
[153]
R. Quijada, A. Raventós, F. Tarrès, R. Durá, and S. Hidalgo. 2014. The use of digital image processing for IC reverse engineering. In Proceedings of the IEEE 11th International Multi-Conference on Systems, Signals Devices (SSD’14). 1–4.
[154]
M. T. Rahman and M. N. A. Dewan. 2014. Analytical determination of collisional sheath properties for triple frequency capacitively coupled plasma. IEEE Trans. Plasma Sci. 42, 3 (2014), 729–734.
[155]
M. Tanjidur Rahman, M. Sazadur Rahman, Huanyu Wang, Shahin Tajik, Waleed Khalil, Farimah Farahmandi, Domenic Forte, Navid Asadizanjani, and Mark Tehranipoor. 2020. Defense-in-depth: A recipe for logic locking to prevail. Integration 72 (2020), 39–57.
[156]
M. Tanjidur Rahman, Qihang Shi, Shahin Tajik, Haoting Shen, Damon L. Woodard, Mark Tehranipoor, and Navid Asadizanjani. 2018. Physical inspection and attacks: New frontier in hardware security. In Proceedings of the IEEE 3rd International Verification and Security Workshop (IVSW’18). IEEE, 93–102.
[157]
Jeyavijayan Rajendran, Ozgur Sinanoglu, and Ramesh Karri. 2013. VLSI testing based security metric for IC camouflaging. In Proceedings of the IEEE International Test Conference (ITC’13). IEEE, 1–4.
[158]
Joseph Redmon, Santosh Divvala, Ross Girshick, and Ali Farhadi. 2016. You only look once: Unified, real-time object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 779–788.
[159]
Shams Ur Rehman, Ka Fei Thang, and Nai Shyan Lai. 2019. Automated PCB identification and defect-detection system (APIDS).Int. J. Electric. Comput. Eng. 9, 1 (2019).
[160]
Jordan Robertson and Michael Riley. 2018. The Big Hack: Amazon, Apple, Supermicro, and the Chinese Government. Bloomberg Businessweek. Retrieved from https://www.bloomberg.com/news/articles/2018-10-04/the-big-hack-amazon-apple-supermicro-and-beijing-respond.
[161]
Nikolay Rubanov. 2003. SubIslands: The probabilistic match assignment algorithm for subcircuit recognition. IEEE Trans. Comput.-Aided Design Integr. Circ. Syst. 22, 1 (2003), 26–38.
[162]
Makoto Sakakibara, Makoto Suzuki, Kenji Tanimoto, Yasunari Sohda, Daisuke Bizen, and Koji Nakamae. 2019. Impact of secondary electron emission noise in SEM. Microscopy 68, 4 (2019), 279–288.
[163]
Hassan Salmani. 2016. COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans. Info. Forensics Secur. 12, 2 (2016), 338–350.
[164]
Hassan Salmani, Mohammad Tehranipoor, and Ramesh Karri. 2013. On design vulnerability analysis and trust benchmarks development. In Proceedings of the IEEE 31st international conference on computer design (ICCD’13). IEEE, 471–474.
[165]
Martin Salzer, Aaron Spettl, Ole Stenzel, Jan-Henrik Smått, Mika Lindén, Ingo Manke, and Volker Schmidt. 2012. A two-stage approach to the segmentation of FIB-SEM images of highly porous materials. Mater. Character. 69 (2012), 115–126.
[166]
Esha Sarkar and Michail Maniatakos. 2019. On automating delayered IC analysis for hardware IP protection. In Proceedings of the International Conference on Omni-Layer Intelligent Systems. ACM, 205–210.
[167]
Michael E. Scaman and Laertis Economikos. 1995. Computer vision for automatic inspection of complex metal patterns on multichip modules (MCM-D). IEEE Trans. Compon., Packag., Manufactur. Technol.: Part B 18, 4 (1995), 675–684.
[168]
Martin Schobert. [n.d.]. GNU software degate. Retrieved from http://www.degate.org.
[169]
Erich Schubert, Jörg Sander, Martin Ester, Hans Peter Kriegel, and Xiaowei Xu. 2017. DBSCAN revisited, revisited: Why and how you should (still) use DBSCAN. ACM Trans. Database Syst. 42, 3 (2017), 1–21.
[170]
H. Seiler. 1983. Secondary electron emission in the scanning electron microscope. J. Appl. Phys. 54, 11 (1983), R1–R18.
[171]
Hao-Chiang Shao, Chao-Yi Peng, Jun-Rei Wu, Chia-Wen Lin, Shao-Yun Fang, Pin-Yen Tsai, and Yan-Hsiu Liu. 2020. From IC layout to Die Photo: A CNN-Based data-driven approach. Retrieved from https://arXiv:2002.04967.
[172]
Qihang Shi, Nidish Vashistha, Hangwei Lu, Haoting Shen, Bahar Tehranipoor, Damon L. Woodard, and Navid Asadizanjani. 2019. Golden Gates: A new hybrid approach for rapid hardware trojan detection using testing and imaging. In Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust (HOST’19). IEEE, 61–71.
[173]
Yiqiong Shi, Bah-Hwee Gwee, Ye Ren, and Chan Wai Ting. 2012. Extracting functional modules from flattened gate-level netlist. In Proceedings of the International Symposium on Communications and Information Technologies (ISCIT’12). IEEE, 538–543.
[174]
Marek Sikul, Karel Novotny, Matthias Kemmler, and Andreas Rummel. 2018. SEM-Based nanoprobing on in situ delayered advanced 10 nm technology node IC. In Proceedings of the IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA’18). IEEE, 1–4.
[175]
K. S. Sim, M. E. Nia, and C. P. Tso. 2011. Image noise cross-correlation for signal-to-noise ratio estimation in scanning electron microscope images. Scanning 33, 2 (2011), 82–93.
[176]
K. S. Sim, M. E. Nia, and Chih Ping Tso. 2013. Noise variance estimation using image noise cross-correlation model on SEM images. Scanning 35, 3 (2013), 205–212.
[177]
K. S. Sim, J. T. L. Thong, and J. C. H. Phang. 2004. Effect of shot noise and secondary emission noise in scanning electron microscope images. Scan.: J. Scan. Microsc. 26, 1 (2004), 36–40.
[178]
Sergei Skorobogatov. 2011. Physical attacks on tamper resistance: progress and lessons. In Proceedings of the 2nd ARO Special Workshop on Hardware Assurance.
[179]
Jessica Smith. 2013. Non-destructive state machine reverse engineering. In Proceedings of the 6th International Symposium on Resilient Control Systems (ISRCS’13). IEEE, 120–124.
[180]
Ray Smith. 2007. An overview of the Tesseract OCR engine. In Proceedings of the 9th International Conference on Document Analysis and Recognition (ICDAR’07), Vol. 2. IEEE, 629–633.
[181]
Ronald C. Stogdill. 1999. Dealing with obsolete parts. IEEE Design Test Comput. 16, 2 (1999), 17–25.
[182]
Pramod Subramanyan, Nestan Tsiskaridze, Wenchao Li, Adria Gascón, Wei Yang Tan, Ashish Tiwari, Natarajan Shankar, Sanjit A. Seshia, and Sharad Malik. 2013. Reverse engineering digital circuits using structural and functional analyses. IEEE Trans. Emerg. Topics Comput. 2, 1 (2013), 63–80.
[183]
Shamik Sural, Gang Qian, and Sakti Pramanik. 2002. Segmentation and histogram generation using the HSV color space for image retrieval. In Proceedings of the International Conference on Image Processing, Vol. 2. IEEE.
[184]
Benjamin Tan, Ramesh Karri, Nimisha Limaye, Abhrajit Sengupta, Ozgur Sinanoglu, Md Moshiur Rahman, Swarup Bhunia, Danielle Duvalsaint, Amin Rezaei, Yuanqi Shen, et al. 2020. Benchmarking at the frontier of hardware security: Lessons from logic locking. Retrieved from https://arXiv:2006.06806.
[185]
Sanli Tang, Fan He, Xiaolin Huang, and Jie Yang. 2019. Online PCB defect detector On A New PCB defect dataset. Retrieved from arXiv:1902.06197.
[186]
Mohammad Tehranipoor and Farinaz Koushanfar. 2010. A survey of hardware trojan taxonomy and detection. IEEE Design Test Comput. 27, 1 (2010), 10–25.
[187]
Mark Mohammad Tehranipoor, Ujjwal Guin, and Domenic Forte. 2015. Counterfeit integrated circuits. In Counterfeit Integrated Circuits. Springer, 15–36.
[188]
Zvi Terem, Gila Kamhi, Moshe Y. Vardi, and Amitai Irron. 2004. Pattern search in hierarchical high-level designs. In Proceedings of the 11th IEEE International Conference on Electronics, Circuits and Systems (ICECS’04). IEEE, 519–522.
[189]
Thomas Olivier and Dmitry Nedospasov. [n.d.]. On the impact of automating the IC analysis process. https://www. blackhat.com/docs/us-15/materials/us-15-ThomasAdvanced-IC-Reverse-Engineering-Techniques-In-Depth-Anal- ysis-Of-A-Modern-Smart-Card-wp.pdf.
[190]
J. T. L. Thong, K. S. Sim, and J. C. H. Phang. 2001. Single-image signal-to-noise ratio estimation. Scanning 23, 5 (2001), 328–336.
[191]
Xiaojing Tian, Liang Zhao, and Huajun Dong. 2014. Application of image processing in the detection of printed circuit board. In Proceedings of the IEEE Workshop on Electronics, Computer and Applications. IEEE, 157–159.
[192]
F. Timischl, M. Date, and S. Nemoto. 2012. A statistical model of signal–noise in scanning electron microscopy. Scanning 34, 3 (2012), 137–144.
[193]
Randy Torrance and Dick James. 2009. The state-of-the-art in IC reverse engineering. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 363–381.
[194]
Patrick Trampert, Faysal Bourghorbel, Pavel Potocek, Maurice Peemen, Christian Schlinkmann, Tim Dahmen, and Philipp Slusallek. 2018. How should a fixed budget of dwell time be spent in scanning electron microscopy to optimize image quality?Ultramicroscopy 191 (2018), 11–17.
[195]
Bruno Machado Trindade, Eranga Ukwatta, Mike Spence, and Chris Pawlowicz. 2018. Segmentation of integrated circuit layouts from scan electron microscopy images. In Proceedings of the IEEE Canadian Conference on Electrical & Computer Engineering (CCECE’18). IEEE, 1–4.
[196]
Nidish Vashistha, Hangwei Lu, Qihang Shi, M. Tanjidur Rahman, Haoting Shen, Damon L. Woodard, Navid Asadizanjani, and Mark Tehranipoor. 2018. Trojan scanner: Detecting hardware trojans with rapid sem imaging combined with image processing and machine learning. In Proceedings of the 44th International Symposium for Testing and Failure Analysis (ISTFA’18). ASM International, 256.
[197]
Nidish Vashistha, M. Tanjidur Rahman, Haoting Shen, Damon L. Woodard, Navid Asadizanjani, and Mark Tehranipoor. 2018. Detecting hardware trojans inserted by untrusted foundry using physical inspection and advanced image processing. J. Hardw. Syst. Secur. 2, 4 (2018), 333–344.
[198]
Arunkumar Vijayakumar, Vinay C. Patil, Daniel E. Holcomb, Christof Paar, and Sandip Kundu. 2016. Physical design obfuscation of hardware: A comprehensive investigation of device and logic-level techniques. IEEE Trans. Info. Forensics Secur. 12, 1 (2016), 64–77.
[199]
Narayanan Vijaykrishnan and N. Ranganathan. 1996. SUBGEN: A genetic approach for subcircuit extraction. In Proceedings of the 9th International Conference on VLSI Design. IEEE, 343–345.
[200]
Paul Viola and Michael J. Jones. 2004. Robust real-time face detection. Int. J Comput. Vision 57, 2 (2004), 137–154.
[201]
Sebastian Wallat, Nils Albartus, Steffen Becker, Max Hoffmann, Maik Ender, Marc Fyrbiak, Adrian Drees, Sebastian Maaßen, and Christof Paar. 2019. Highway to HAL: Open-sourcing the first extendable gate-level netlist reverse engineering framework. In Proceedings of the 16th ACM International Conference on Computing Frontiers. 392–397.
[202]
Huanyu Wang, Domenic Forte, Mark M. Tehranipoor, and Qihang Shi. 2017. Probing attacks on integrated circuits: Challenges and research opportunities. IEEE Design Test 34, 5 (2017), 63–71.
[203]
Junping Wang, Junming Zhang, and Yue Hao. 2007. IC Image segmentation using eigenvalue clustering. In Proceedings of the International Workshop on Anti-Counterfeiting, Security and Identification (ASID’07). IEEE, 184–187.
[204]
Wei-Chien Wang, Shang-Liang Chen, Liang-Bi Chen, and Wan-Jung Chang. 2016. A machine vision based automatic optical inspection system for measuring drilling quality of printed circuit boards. IEEE Access 5 (2016), 10817–10833.
[205]
Yuxin Wang, Yu-chen Karen Chen, and Wilson K. Chiu. 2011. In Situ 3D imaging and characterization of nano-structures with X-ray Nano-CT technique. ECS Trans. 35, 24 (2011), 21.
[206]
Yiming Wen and Weize Yu. 2021. Combining thermal maps with inception neural networks for hardware trojan detection. IEEE Embed. Syst. Lett. 13, 2 (2021), 45–48.
[207]
Ronald Wilson, Rabin Y. Acharya, Domenic Forte, Navid Asadizanjani, and Damon Woodard. 2019. A novel approach to unsupervised automated extraction of standard cell library for reverse engineering and hardware assurance. In Proceedings of the 45th International Symposium for Testing and Failure Analysis (ISTFA’19). ASM International, 249.
[208]
Ronald Wilson, Navid Asadizanjani, Domenic Forte, and Damon L. Woodard. 2019. First auto-magnifier platform for hardware assurance and reverse engineering integrated circuits. Microsc. Microanal. 25, S2 (2019), 226–227.
[209]
Ronald Wilson, Navid Asadizanjani, Domenic Forte, and Damon L. Woodard. 2020. Histogram-based auto segmentation: A novel approach to segmenting integrated circuit structures from SEM images. Retrieved from https://arXiv:2004.13874.
[210]
Ronald Wilson, Domenic Forte, Navid Asadizanjani, and Damon Woodard. 2020. LASRE: A novel approach to large area accelerated segmentation for reverse engineering on SEM images. In Proceedings of the 46th International Symposium for Testing and Failure Analysis (ISTFA’20). ASM International, to be published.
[211]
Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, and Domenic Forte. 2017. Novel bypass attack and BDD-based tradeoff analysis against all known logic locking attacks. In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems. Springer, 189–210.
[212]
Lei Yang and C.-J. R. Shi. 2003. FROSTY: A fast hierarchy extractor for industrial CMOS circuits. In Proceedings of the International Conference on Computer Aided Design (ICCAD’03). IEEE, 741–746.
[213]
Jing Yuan, Egil Bae, and Xue-Cheng Tai. 2010. A study on continuous max-flow and min-cut approaches. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. IEEE, 2217–2224.
[214]
S. S. Zakaria, A. Amir, N. Yaakob, and S. Nazemi. 2020. Automated detection of printed circuit boards (PCB) defects by using machine learning in electronic manufacturing: Current approaches. MS&E 767, 1 (2020), 012064.
[215]
Vyacheslav L. Zavadsky, Val Gont, Edward Keyes, Jason Abt, and Stephen Begg. 2009. Method of design analysis of existing integrated circuits. U.S. Patent 7,580,557.
[216]
Vyacheslav L. Zavadsky, Val Gont, Edward Keyes, Jason Abt, and Stephen Begg. 2010. Method of design analysis of existing integrated circuits. U.S. Patent 7,643,665.
[217]
David Zhang, Gooitzen van der Wal, Phil Miller, David Stoker, Erik Matlin, Naveen Marri, Gary Gan, Joe Zhang, Jane Asmuth, Sek Chai, et al. 2019. Fast, Full Chip Image Stitching of Nanoscale Integrated Circuits. Technical Report. SRI International Princeton United States.
[218]
Fengchao Zhang, Andrew Hennessy, and Swarup Bhunia. 2015. Robust counterfeit PCB detection exploiting intrinsic trace impedance variations. In Proceedings of the IEEE 33rd VLSI Test Symposium (VTS’15). IEEE, 1–6.
[219]
Nian Zhang and Donald C. Wunsch. 2003. A fuzzy attributed graph approach to subcircuit extraction problem. In Proceedings of the 12th IEEE International Conference on Fuzzy Systems (FUZZ’03), Vol. 2. IEEE, 1063–1067.
[220]
Nian Zhang and Donald C. Wunsch II. 2006. Speeding up vlsi layout verification using fuzzy attributed graphs approach. IEEE Trans. Fuzzy Syst. 14, 6 (2006), 728–737.
[221]
Boyou Zhou, Aydan Aksoylar, Kyle Vigil, Ronen Adato, Jian Tan, Bennett Goldberg, M. Selim Ünlü, and Ajay Joshi. 2021. Hardware trojan detection using backside optical imaging. IEEE Trans. Comput.-Aided Design Integr. Circ. Syst. 40, 1 (2020), 24–37.
[222]
Juanhua Zhu, Ang Wu, and Xinping Liu. 2018. Printed circuit board defect visual detection based on wavelet denoising. In Proceedings of the IOP Conference Series: Materials Science and Engineering, Vol. 392. 062055.

Cited By

View all
  • (2024)Enhancing manufacturing operations with synthetic data: a systematic framework for data generation, accuracy, and utilityFrontiers in Manufacturing Technology10.3389/fmtec.2024.13201664Online publication date: 13-Feb-2024
  • (2024)On Modeling and Detecting Trojans in Instruction SetsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2024.338955843:10(3226-3239)Online publication date: Oct-2024
  • (2024)Integrated Circuit Mask–Generative Adversarial Network for Circuit Annotation With Targeted Data AugmentationIEEE Intelligent Systems10.1109/MIS.2023.330659939:1(37-45)Online publication date: 1-Jan-2024
  • Show More Cited By

Index Terms

  1. Hardware Trust and Assurance through Reverse Engineering: A Tutorial and Outlook from Image Analysis and Machine Learning Perspectives

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Journal on Emerging Technologies in Computing Systems
      ACM Journal on Emerging Technologies in Computing Systems  Volume 17, Issue 4
      October 2021
      446 pages
      ISSN:1550-4832
      EISSN:1550-4840
      DOI:10.1145/3472280
      • Editor:
      • Ramesh Karri
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Journal Family

      Publication History

      Published: 30 June 2021
      Accepted: 01 April 2021
      Revised: 01 March 2021
      Received: 01 October 2020
      Published in JETC Volume 17, Issue 4

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Hardware counterfeiting
      2. hardware trojan
      3. imaging
      4. image processing
      5. integrated circuits
      6. machine learning
      7. printed circuit boards
      8. reverse engineering
      9. trust and assurances

      Qualifiers

      • Research-article
      • Refereed

      Funding Sources

      • Cisco
      • AFOSR
      • National Science Foundation
      • National Science Foundation Graduate Research Fellowship

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)713
      • Downloads (Last 6 weeks)84
      Reflects downloads up to 12 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Enhancing manufacturing operations with synthetic data: a systematic framework for data generation, accuracy, and utilityFrontiers in Manufacturing Technology10.3389/fmtec.2024.13201664Online publication date: 13-Feb-2024
      • (2024)On Modeling and Detecting Trojans in Instruction SetsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2024.338955843:10(3226-3239)Online publication date: Oct-2024
      • (2024)Integrated Circuit Mask–Generative Adversarial Network for Circuit Annotation With Targeted Data AugmentationIEEE Intelligent Systems10.1109/MIS.2023.330659939:1(37-45)Online publication date: 1-Jan-2024
      • (2024)HiFi-DRAM: Enabling High-fidelity DRAM Research by Uncovering Sense Amplifiers with IC Imaging2024 ACM/IEEE 51st Annual International Symposium on Computer Architecture (ISCA)10.1109/ISCA59077.2024.00020(133-149)Online publication date: 29-Jun-2024
      • (2024)Parasitic Circus: On the Feasibility of Golden-Free PCB Verification2024 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA)10.1109/IPFA61654.2024.10691201(01-07)Online publication date: 15-Jul-2024
      • (2024)Unsupervised Domain Adaptation with Pseudo Shape Supervision for IC Image Segmentation2024 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA)10.1109/IPFA61654.2024.10690992(1-6)Online publication date: 15-Jul-2024
      • (2024)Circuit Object Detection and Standard Cell Recognition in IC Images Based on Semantic Segmentation Techniques2024 IEEE 2nd International Conference on Image Processing and Computer Applications (ICIPCA)10.1109/ICIPCA61593.2024.10709193(300-303)Online publication date: 28-Jun-2024
      • (2024)Trusted microelectronics: reverse engineering chip die using U-Net convolutional networkEngineering Research Express10.1088/2631-8695/ad7c066:4(045311)Online publication date: 9-Oct-2024
      • (2024)Novel methods for locating and matching IC cells based on standard cell librariesMicroelectronic Engineering10.1016/j.mee.2023.112107283:COnline publication date: 1-Jan-2024
      • (2024)Analyzing Aging Effects on SRAM PUFs: Implications for Security and ReliabilityJournal of Hardware and Systems Security10.1007/s41635-024-00154-68:3(174-186)Online publication date: 27-Jul-2024
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Login options

      Full Access

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media