-
Notifications
You must be signed in to change notification settings - Fork 89
HAL in Academia
HAL has been used in the context of numerous academic publications so far, some of them even made it into plugins that are now part of this repository. A non-exhaustive list of publications includes:
-
Gregor Leander et al. "HAWKEYE - Recovering Symmetric Cryptography From Hardware Circuits." IACR Annual International Cryptology Conference (Crypto), 2024
-
Simon Klix et al. "Stealing Maggie's Secrets - On the Challenges of IP Theft Through FPGA Reverse Engineering." arXiv, 2023
-
Susanne Engels et al. "A critical view on the real-world security of logic locking." Journal of Cryptographic Engineering (JCEN), 2022
-
Nils Albartus et al. "DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering." IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2020
-
Sebastian Wallat et al. "Highway to HAL: Open-Sourcing the First Extendable Gate-Level Netlist Reverse Engineering Framework." ACM International Conference on Computing Frontiers (CF), 2019
-
Carina Wiesen et al. "Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights." IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), 2018
-
Carina Wiesen et al. "The Anatomy of Hardware Reverse Engineering: An Exploration of Human Factors During Problem Solving"
-
Carina Wiesen et al. "Towards Cognitive Obfuscation Impeding Hardware Reverse Engineering Based on Psychological Insights"
-
Carina Wiesen et al. "Promoting the Acquisition of Hardware Reverse Engineering Skills"
-
Leonid Azriel et al. "Towards Open Scan for the Open-source Hardware"
-
Florian Stolz et al. "LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security"
-
Steffen Becker et al. "An Exploratory Study of Hardware Reverse Engineering — Technical and Cognitive Processes"
-
Maik Ender et al. "Insights into the Mind of a Trojan Designer"
-
Marc Fyrbiak et al. "On the Difficulty of FSM-based Hardware Obfuscation"
-
Marc Farbiak et al. "HAL - The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion"
-
Aparajithan Nathamuni-Venkatesan et al. "Word-Level Structure Identification In FPGA Designs Using Cell Proximity Information"
-
Ram Venkat Narayanan et al. "Reverse Engineering Word-Level Models from Look-Up Table Netlists"
-
Sundarakumar Muthukumaran et al. "Reverse Engineering of RTL Controllers from Look-Up Table Netlists"
-
Max Hoffmann et al. "Doppelganger Obfuscation — Exploring the Defensive and Offensive Aspects of Hardware Camouflaging"