{"id":3672,"date":"2022-12-17T21:33:42","date_gmt":"2022-12-17T21:33:42","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=3672"},"modified":"2022-12-18T18:24:06","modified_gmt":"2022-12-18T18:24:06","slug":"hal","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/cad-tools\/reverse-engineering\/hal\/","title":{"rendered":"HAL"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Tool Name<\/h2>\n\n\n\n<p>HAL<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Description<\/strong><\/h2>\n\n\n\n<p>We present HAL, a comprehensive reverse engineering and manipulation framework for gate-level netlists. HAL allows automating defensive design analysis (e.g., including arbitrary Trojan detection algorithms with minimal effort) as well as offensive reverse engineering and targeted logic insertion.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>More Info<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button\" href=\"https:\/\/github.com\/emsec\/hal\" target=\"_blank\" rel=\"noreferrer noopener\">tool link<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Publications\/References<\/strong><\/h2>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/eprint.iacr.org\/2017\/783.pdf\" target=\"_blank\"> <\/a>M. Fyrbiak\u00a0<em>et al<\/em>., &#8220;HAL\u2014The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion,&#8221; in\u00a0<em>IEEE Transactions on Dependable and Secure Computing<\/em>, vol. 16, no. 3, pp. 498-510, 1 May-June 2019, doi: 10.1109\/TDSC.2018.2812183.<a href=\"https:\/\/eprint.iacr.org\/2017\/783.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"> <\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/eprint.iacr.org\/2017\/783.pdf\" target=\"_blank\">https:\/\/eprint.iacr.org\/2017\/783.pdf<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Contacts<\/strong><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Tool Name HAL Description We present HAL, a comprehensive reverse engineering and manipulation framework for gate-level netlists. HAL allows automating defensive design analysis (e.g., including arbitrary Trojan detection algorithms with minimal effort) as well as offensive reverse engineering and targeted logic insertion. More Info Publications\/References M. Fyrbiak\u00a0et al., &#8220;HAL\u2014The Missing Piece of the Puzzle for &hellip;<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":1739,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3672"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=3672"}],"version-history":[{"count":3,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3672\/revisions"}],"predecessor-version":[{"id":3751,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3672\/revisions\/3751"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/1739"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=3672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}