🤖 AI Summary
To address the lack of integrated, reproducible, and pedagogically suitable gate-level netlist analysis tools in hardware reverse engineering, this paper introduces and open-sources NetSAT—the first unified, extensible, and education-friendly gate-level netlist analysis framework. Implemented in C++ and Python, NetSAT features an interactive Qt GUI, dual-language (C++/Python) APIs, and a modular plugin architecture. It innovatively integrates word-level abstraction modeling, graph-structural mining, cryptographic feature identification, and co-simulation capabilities to enable automated functional module decomposition and semantic understanding of netlists. NetSAT has been cited in over 23 peer-reviewed academic publications, adopted in university curricula and international conference tutorials, and garnered more than 680 GitHub stars and 86 forks. It is now widely recognized as a de facto standard tool for hardware security analysis in both industry and government agencies.
📝 Abstract
HAL is an open-source framework for gate-level netlist analysis, an integral step in hardware reverse engineering. It provides analysts with an interactive GUI, an extensible plugin system, and APIs in both C++ and Python for rapid prototyping and automation. In addition, HAL ships with plugins for word-level modularization, cryptographic analysis, simulation, and graph-based exploration. Since its release in 2019, HAL has become widely adopted in academia, industry, government, and teaching. It underpins at least 23 academic publications, is taught in hands-on trainings, conference tutorials, and university classes, and has collected over 680 stars and 86 forks on GitHub. By enabling accessible and reproducible hardware reverse engineering research, HAL has significantly advanced the field and the understanding of real-world capabilities and threats.