SoK: From Silicon to Netlist and Beyond $-$ Two Decades of Hardware Reverse Engineering Research

πŸ“… 2026-03-18
πŸ“ˆ Citations: 0
✨ Influential: 0
πŸ“„ PDF
πŸ€– AI Summary
Hardware reverse engineering (HRE) research has long suffered from fragmentation and a lack of systematic integration, impeding rigorous technical evaluation and reproducibility. This work presents the first systematization of knowledge (SoK) based on a comprehensive review of 187 peer-reviewed publications over the past two decades, focusing on integrated circuits, FPGAs, and netlist-level reverse engineering. We introduce an artifact-centric reproducibility framework, complemented by benchmark analyses and a survey of relevant legal and policy considerations. Empirical assessment reveals that only seven studies (4%) are fully reproducible. Building on these findings, we propose three key recommendations: enhancing artifact reusability, establishing unified evaluation benchmarks, and clarifying the legal boundaries of HRE research. Collectively, these contributions offer a roadmap to foster interdisciplinary collaboration and advance the field in a principled, reproducible manner.

Technology Category

Application Category

πŸ“ Abstract
As hardware serves as the root of trust in modern computing systems, Hardware Reverse Engineering (HRE) is foundational for security assurance. In practice, HRE enables critical security applications, including design verification, supply-chain assurance, and vulnerability discovery. Over the past two decades, academic research on Integrated Circuit (IC), Field-Programmable Gate Array (FPGA), and netlist reverse engineering has steadily grown. However, knowledge remains fragmented across domains and communities, which complicates assessing the state of the art and hampers identifying shared research challenges. In this paper, we present a systematization of knowledge based on an in-depth analysis of 187 peer-reviewed publications. Using this corpus, we characterize technical methods across the HRE workflow and identify technical and organizational challenges that impede research progress. We analyze all 30 artifacts from our corpus using established artifact evaluation practices. Key results could be reproduced for only seven publications (4%). Based on our findings, we derive stakeholder-centric recommendations for academia, industry, and government to enable more coordinated and reproducible HRE research. These recommendations target three cross-cutting opportunities: (i) improving reproducibility and reuse via artifact-centric practices, (ii) enabling rigorous comparability through standardized benchmarks and evaluation metrics, and (iii) improving legal clarity for public HRE research.
Problem

Research questions and friction points this paper is trying to address.

Hardware Reverse Engineering
Reproducibility
Standardization
Research Fragmentation
Legal Clarity
Innovation

Methods, ideas, or system contributions that make the work stand out.

Hardware Reverse Engineering
Systematization of Knowledge
Reproducibility
Artifact Evaluation
Standardized Benchmarking
πŸ”Ž Similar Papers
No similar papers found.
Z
Zehra Karadağ
Ruhr University Bochum; Max Planck Institute for Security and Privacy
S
Simon Klix
Max Planck Institute for Security and Privacy
R
RenΓ© Walendy
Max Planck Institute for Security and Privacy
F
Felix Hahn
Max Planck Institute for Security and Privacy
K
Kolja Dorschel
Max Planck Institute for Security and Privacy
Julian Speith
Julian Speith
Max Planck Institute for Security and Privacy
Hardware SecurityHardware Reverse EnginneringHardware TrojansHardware IP Protection
Christof Paar
Christof Paar
Max Planck Institute for Security and Privacy, Bochum
Steffen Becker
Steffen Becker
Research Center for Trustworthy Data Science and Security, RUB, MPI-SP
hardware securityhuman factors in security