Reverse Engineering Simulation

Analyzing a gate-level netlist for identification and reverse engineering of malicious modifications made to an IP core.

Read the paper (coming soon) »

Setup

This section details the setup and installation requirements of the RESim scripts.

View details »

Procedure

This section details the procedure for executing all of the scripts RESim is composed of.

View details »

Results

This section shows the initial results found for the RSA cyptographic and AES encryption circuits.

View details »