Reverse Engineering Simulation

Analyzing a gate-level netlist for identification and reverse engineering of malicious modifications made to an IP core.

Read the paper (coming soon) »


This section details the setup and installation requirements of the RESim scripts.

View details »


This section details the procedure for executing all of the scripts RESim is composed of.

View details »


This section shows the initial results found for the RSA cyptographic and AES encryption circuits.

View details »