Discussion Tables

List of Topics

  1. Sample Preparation: Depackaging
  2. Sample Preparation: Delayering
  3. Image Acquisition
  4. Image Processing: Stacking & Stitching
  5. Image Processing: Vectorization for Netlist Extraction
  6. Error Detection and Correction
  7. Region of Interest Identification
  8. Non-/Semi-invasive Techniques for HRE
  9. FPGA Bitstream Format Reverse Engineering
  10. FPGA Attacks & Protection
  11. Netlist Reverse Engineering
  12. Machine Learning for Netlist Reverse Engineering
  13. Defences against Hardware Reverse Engineering
  14. Hardware Trojan Design & Detection
  15. Detection of IP Infringement
  16. Benchmarks for Hardware Reverse Engineering
  17. Hardware Reverse Engineering Tools and Frameworks
  18. Human Factors and Professional Training in/for HRE
  19. Start-Up Opportunities in HRE