Publikationen:
DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering Stealing Maggie's Secrets – On the Challenges of IP Theft Through FPGA Reverse Engineering LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note A survey of algorithmic methods in IC reverse engineering An Exploratory Study of Hardware Reverse Engineering — Technical and Cognitive Processes