Skip to main content
Log in

Steffen Becker, Carina Wiesen, Christof Paar, Nikol Rummel

Wie arbeiten Reverse Engineers?

Interdisziplinäre Forschung zum Verständnis technischer und kognitiver Prozesse beim Hardware-Reverse-Engineering

  • Schwerpunkt
  • Published:
Datenschutz und Datensicherheit - DuD Aims and scope Submit manuscript

Zusammenfassung

Im Forschungsprojekt ,,Lernprozesse in der IT-Sicherheit‘‘ beschäftigen sich die Autoren mit der Frage, wie Hacking-Angriffe auf Hardware ablaufen. Gemeinsam erforschen sie die technischen und menschlichen Prozesse, die maßgeblich den Erfolg eines Hardware-Angriffs beeinflussen. Mit den Erkenntnissen zu den mentalen Vorgängen sollen optimierte Gegenmaßnahmen entwickelt werden (,,kognitive Obfuskation‘‘), die zudem das Hacken durch menschliche Angreifer und Angreiferinnen besonders erschweren.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Literatur

  1. Wiesen, C., Albartus, N., Hoffmann, M., Becker, S., Wallat, S., Fyrbiak, M., Rummel, N., & Paar, C. (2019). Towards cognitive obfuscation: impeding Hardware-Reverse-Engineering based on psychological insights. In Proceedings of the 24th Asia and South Pacific Design Automation Conference (pp. 104-111). ACM.

  2. Rekoff, M. G. (1985). On reverse engineering. IEEE Transactions on systems, man, and cybernetics, (2), 244-252.

    Article  Google Scholar 

  3. Torrance, R., & James, D. (2009). The state-of-the-art in IC reverse engineering. In International Workshop on Cryptographic Hardware and Embedded Systems (pp. 363-381).

  4. Subramanyan, P., Tsiskaridze, N., Li, W., Gascón, A., Tan, W. Y., Tiwari, A., & Malik, S. (2013). Reverse engineering digital circuits using structural and functional analyses. IEEE Transactions on Emerging Topics in Computing, 2(1), 63-80.

    Article  Google Scholar 

  5. Lee, N. L., & Johnson-Laird, P. N. (2013). A theory of reverse engineering and its application to Boolean systems. Journal of Cognitive Psychology, 25(4), 365-389.

    Article  Google Scholar 

  6. Larkin, J., McDermott, J., Simon, D. P., & Simon, H. A. (1980). Expert and novice performance in solving physics problems. Science, 208(4450), 1335-1342.

    Article  Google Scholar 

  7. Boshuizen, H. P., & Schmidt, H. G. (1992). On the role of biomedical knowledge in clinical reasoning by experts, intermediates and novices. Cognitive science, 16(2), 153-184.

    Article  Google Scholar 

  8. Wiesen, C., Becker, S., Fyrbiak, M., Albartus, N., Elson, M., Rummel, N., & Paar, C. (2018). Teaching Hardware-Reverse-Engineering: Educational Guidelines and Practical Insights. In 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE) (pp. 438-445). IEEE.

  9. Rheinberg, F., Vollmeyer, R., & Burns, B. D. (2001). FAM: Ein Fragebogen zur Erfassung aktueller Motivation in Lern-und Leistungssituationen (Langversion, 2001). Diagnostica, 2, 57-66.

    Article  Google Scholar 

  10. Bratfisch, O. (1972). Perceived Item-Difficulty in Three Tests of Intellectual Performance Capacity.

  11. Paas, F. G. (1992). Training strategies for attaining transfer of problem-solving skill in statistics: A cognitive-load approach. Journal of educational psychology, 84(4), 429.

    Article  Google Scholar 

  12. Wechsler, D. (2008). Wechsler Adult Intelligence Scale–Fourth Edition (WAIS–IV). San Antonio, TX: NCS Pearson, 22, 498.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Steffen Becker.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Becker, S., Wiesen, C., Paar, C. et al. Wie arbeiten Reverse Engineers? . Datenschutz Datensich 43, 686–690 (2019). https://doi.org/10.1007/s11623-019-1190-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11623-019-1190-7

Navigation