NACH OBEN

Research Topic: Cognitive Aspects in Netlist Reverse Engineering

Duration

 

10/2022-09/2024

Funded by

 

[Ministry of Innovation, Higher Education and Research of North Rhine-Westphalia]

Researchers

 

Prof. Dr. Nikol Rummel, M.Sc. Markus Weber

External website

 

http://www.sechuman.rub.de/

External partners

 

Prof. Christof Paar (Max Planck Institute for Security and Privacy), René Walendy (University of Bochum)

Project description

SecHuman is a transdiciplinary graduate school in which tandems of doctoral students work on contemporary technical and societal challenges of IT security. These tandems are joined by a field-partner (enterprise, NGO, …).

Despite intensive technical research, netlist reverse engineering remains an opaque and as yet little understood process. This is due, among other things, to the fact that non-automated procedures of human analysts in netlist reverse engineering are largely unclear. Initial exploratory findings from qualitative data suggest that working memory may have an impact on speed in hardware reverse engineering (Becker & Wiesen et al., 2020). The aim of the current project is to validate these results and identify further cognitive factors associated with netlist reverse engineering experiences.

Becker, S., Wiesen, C., Albartus, N., Rummel, N., Paar, C. (2020). An Exploratory Study of Hardware Reverse Engineering - Technical and Cognitive Processes: Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). USENIX Association. https://www.usenix.org/conference/soups2020/technical-sessions

 

Back to current projects