{"id":"https://openalex.org/W7138937421","doi":"https://doi.org/10.48550/arxiv.2603.17883","title":"SoK: From Silicon to Netlist and Beyond $-$ Two Decades of Hardware Reverse Engineering Research","display_name":"SoK: From Silicon to Netlist and Beyond $-$ Two Decades of Hardware Reverse Engineering Research","publication_year":2026,"publication_date":"2026-03-18","ids":{"openalex":"https://openalex.org/W7138937421","doi":"https://doi.org/10.48550/arxiv.2603.17883"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.17883","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.17883","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.17883","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5130105101","display_name":"Zehra Karada\u011f","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Karada\u011f, Zehra","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129812951","display_name":"Simon Klix","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Klix, Simon","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020286350","display_name":"Ren\u00e9 Walendy","orcid":"https://orcid.org/0000-0002-5378-3833"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Walendy, Ren\u00e9","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129862705","display_name":"Felix Hahn","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hahn, Felix","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130033275","display_name":"Kolja Dorschel","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dorschel, Kolja","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031331709","display_name":"Julian Speith","orcid":"https://orcid.org/0000-0002-8408-8518"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Speith, Julian","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130006680","display_name":"Christof Paar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Paar, Christof","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5129980897","display_name":"Steffen Becker","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Becker, Steffen","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5130105101"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.95660001039505,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.95660001039505,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.03310000151395798,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.003000000026077032,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/netlist","display_name":"Netlist","score":0.8087999820709229},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.7789000272750854},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.5755000114440918},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.5738999843597412},{"id":"https://openalex.org/keywords/artifact","display_name":"Artifact (error)","score":0.4805999994277954},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47589999437332153},{"id":"https://openalex.org/keywords/clarity","display_name":"CLARITY","score":0.40630000829696655},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.3767000138759613}],"concepts":[{"id":"https://openalex.org/C177650935","wikidata":"https://www.wikidata.org/wiki/Q1760303","display_name":"Netlist","level":2,"score":0.8087999820709229},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.7789000272750854},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.649399995803833},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5856999754905701},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.5755000114440918},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.5738999843597412},{"id":"https://openalex.org/C2779010991","wikidata":"https://www.wikidata.org/wiki/Q2720909","display_name":"Artifact (error)","level":2,"score":0.4805999994277954},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47589999437332153},{"id":"https://openalex.org/C2777146004","wikidata":"https://www.wikidata.org/wiki/Q14949826","display_name":"CLARITY","level":2,"score":0.40630000829696655},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.3767000138759613},{"id":"https://openalex.org/C197947376","wikidata":"https://www.wikidata.org/wiki/Q5155608","display_name":"Comparability","level":2,"score":0.36880001425743103},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.350600004196167},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3418000042438507},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.33809998631477356},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.3294000029563904},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.30649998784065247},{"id":"https://openalex.org/C160713754","wikidata":"https://www.wikidata.org/wiki/Q1389965","display_name":"Maintainability","level":2,"score":0.28780001401901245},{"id":"https://openalex.org/C108650721","wikidata":"https://www.wikidata.org/wiki/Q1783253","display_name":"Counterfactual thinking","level":2,"score":0.2863999903202057},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.2831999957561493},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.27320000529289246},{"id":"https://openalex.org/C188087704","wikidata":"https://www.wikidata.org/wiki/Q369577","display_name":"Standardization","level":2,"score":0.2689000070095062},{"id":"https://openalex.org/C137981799","wikidata":"https://www.wikidata.org/wiki/Q1369184","display_name":"Reusability","level":3,"score":0.26010000705718994},{"id":"https://openalex.org/C2982740150","wikidata":"https://www.wikidata.org/wiki/Q5249230","display_name":"Design cycle","level":2,"score":0.2572000026702881},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.25519999861717224},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.25440001487731934},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.25380000472068787},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2517000138759613}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.17883","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.17883","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.17883","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.17883","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.40933969616889954}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"As":[0],"hardware":[1],"serves":[2],"as":[3],"the":[4,37,69,72,106],"root":[5],"of":[6,71,87,94],"trust":[7],"in":[8],"modern":[9],"computing":[10],"systems,":[11],"Hardware":[12],"Reverse":[13],"Engineering":[14],"(HRE)":[15],"is":[16],"foundational":[17],"for":[18,137,150,192],"security":[19,26],"assurance.":[20],"In":[21,80],"practice,":[22],"HRE":[23,107,161,194],"enables":[24],"critical":[25],"applications,":[27],"including":[28],"design":[29],"verification,":[30],"supply-chain":[31],"assurance,":[32],"and":[33,51,64,74,109,112,153,159,172,184,187],"vulnerability":[34],"discovery.":[35],"Over":[36],"past":[38],"two":[39],"decades,":[40],"academic":[41],"research":[42,78,117],"on":[43,90,143],"Integrated":[44],"Circuit":[45],"(IC),":[46],"Field-Programmable":[47],"Gate":[48],"Array":[49],"(FPGA),":[50],"netlist":[52],"reverse":[53],"engineering":[54],"has":[55],"steadily":[56],"grown.":[57],"However,":[58],"knowledge":[59,88],"remains":[60],"fragmented":[61],"across":[62,105],"domains":[63],"communities,":[65],"which":[66],"complicates":[67],"assessing":[68],"state":[70],"art":[73],"hampers":[75],"identifying":[76],"shared":[77],"challenges.":[79],"this":[81,99],"paper,":[82],"we":[83,101,146],"present":[84],"a":[85],"systematization":[86],"based":[89],"an":[91],"in-depth":[92],"analysis":[93],"187":[95],"peer-reviewed":[96],"publications.":[97],"Using":[98],"corpus,":[100],"characterize":[102],"technical":[103,111],"methods":[104],"workflow":[108],"identify":[110],"organizational":[113],"challenges":[114],"that":[115],"impede":[116],"progress.":[118],"We":[119],"analyze":[120],"all":[121],"30":[122],"artifacts":[123],"from":[124],"our":[125,144],"corpus":[126],"using":[127],"established":[128],"artifact":[129],"evaluation":[130,185],"practices.":[131],"Key":[132],"results":[133],"could":[134],"be":[135],"reproduced":[136],"only":[138],"seven":[139],"publications":[140],"(4%).":[141],"Based":[142],"findings,":[145],"derive":[147],"stakeholder-centric":[148],"recommendations":[149,164],"academia,":[151],"industry,":[152],"government":[154],"to":[155],"enable":[156],"more":[157],"coordinated":[158],"reproducible":[160],"research.":[162,195],"These":[163],"target":[165],"three":[166],"cross-cutting":[167],"opportunities:":[168],"(i)":[169],"improving":[170,189],"reproducibility":[171],"reuse":[173],"via":[174],"artifact-centric":[175],"practices,":[176],"(ii)":[177],"enabling":[178],"rigorous":[179],"comparability":[180],"through":[181],"standardized":[182],"benchmarks":[183],"metrics,":[186],"(iii)":[188],"legal":[190],"clarity":[191],"public":[193]},"counts_by_year":[],"updated_date":"2026-03-20T20:54:20.808490","created_date":"2026-03-20T00:00:00"}
