Tool Name
HAL
Description
We present HAL, a comprehensive reverse engineering and manipulation framework for gate-level netlists. HAL allows automating defensive design analysis (e.g., including arbitrary Trojan detection algorithms with minimal effort) as well as offensive reverse engineering and targeted logic insertion.
More Info
Publications/References
M. Fyrbiak et al., “HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion,” in IEEE Transactions on Dependable and Secure Computing, vol. 16, no. 3, pp. 498-510, 1 May-June 2019, doi: 10.1109/TDSC.2018.2812183. https://eprint.iacr.org/2017/783.pdf