Skip to content

HAL in Academia

SJulianS edited this page Jun 4, 2024 · 9 revisions

HAL has been used in the context of numerous academic publications so far, some of them even made it into plugins that are now part of this repository. A non-exhaustive list of publications includes:

  • Gregor Leander et al. "HAWKEYE - Recovering Symmetric Cryptography From Hardware Circuits." IACR Annual International Cryptology Conference (Crypto), 2024

  • Simon Klix et al. "Stealing Maggie's Secrets - On the Challenges of IP Theft Through FPGA Reverse Engineering." arXiv, 2023

  • Susanne Engels et al. "A critical view on the real-world security of logic locking." Journal of Cryptographic Engineering (JCEN), 2022

  • Nils Albartus et al. "DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering." IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2020

  • Sebastian Wallat et al. "Highway to HAL: Open-Sourcing the First Extendable Gate-Level Netlist Reverse Engineering Framework." ACM International Conference on Computing Frontiers (CF), 2019

  • Carina Wiesen et al. "Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights." IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), 2018

  • Carina Wiesen et al. "The Anatomy of Hardware Reverse Engineering: An Exploration of Human Factors During Problem Solving"

  • Carina Wiesen et al. "Towards Cognitive Obfuscation Impeding Hardware Reverse Engineering Based on Psychological Insights"

  • Carina Wiesen et al. "Promoting the Acquisition of Hardware Reverse Engineering Skills"

  • Leonid Azriel et al. "Towards Open Scan for the Open-source Hardware"

  • Florian Stolz et al. "LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security"

  • Steffen Becker et al. "An Exploratory Study of Hardware Reverse Engineering — Technical and Cognitive Processes"

  • Maik Ender et al. "Insights into the Mind of a Trojan Designer"

  • Marc Fyrbiak et al. "On the Difficulty of FSM-based Hardware Obfuscation"

  • Marc Farbiak et al. "HAL - The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion"

  • Aparajithan Nathamuni-Venkatesan et al. "Word-Level Structure Identification In FPGA Designs Using Cell Proximity Information"

  • Ram Venkat Narayanan et al. "Reverse Engineering Word-Level Models from Look-Up Table Netlists"

  • Sundarakumar Muthukumaran et al. "Reverse Engineering of RTL Controllers from Look-Up Table Netlists"

  • Max Hoffmann et al. "Doppelganger Obfuscation — Exploring the Defensive and Offensive Aspects of Hardware Camouflaging"

Clone this wiki locally