Promoting the Acquisition of Hardware Reverse Engineering Skills
- URL: http://arxiv.org/abs/2105.13725v1
- Date: Fri, 28 May 2021 10:45:17 GMT
- Title: Promoting the Acquisition of Hardware Reverse Engineering Skills
- Authors: Carina Wiesen and Steffen Becker and Nils Albartus Christof Paar and
Nikol Rummel
- Abstract summary: This research paper focuses on skill acquisition in Hardware Reverse Engineering (HRE)
Even though the scientific community and industry have a high demand for HRE experts, there is a lack of educational courses.
To investigate how novices acquire HRE skills in our course, we conducted two studies with students on different levels of prior knowledge.
- Score: 0.7487407411063094
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: This full research paper focuses on skill acquisition in Hardware Reverse
Engineering (HRE) - an important field of cyber security. HRE is a prevalent
technique routinely employed by security engineers (i) to detect malicious
hardware manipulations, (ii) to conduct VLSI failure analysis, (iii) to
identify IP infringements, and (iv) to perform competitive analyses. Even
though the scientific community and industry have a high demand for HRE
experts, there is a lack of educational courses. We developed a
university-level HRE course based on general cognitive psychological research
on skill acquisition, as research on the acquisition of HRE skills is lacking
thus far. To investigate how novices acquire HRE skills in our course, we
conducted two studies with students on different levels of prior knowledge. Our
results show that cognitive factors (e.g., working memory), and prior
experiences (e.g., in symmetric cryptography) influence the acquisition of HRE
skills. We conclude by discussing implications for future HRE courses and by
outlining ideas for future research that would lead to a more comprehensive
understanding of skill acquisition in this important field of cyber security.
Related papers
- An Evidence-Based Curriculum Initiative for Hardware Reverse Engineering Education [5.794342083222512]
This paper investigates the current state of education in hardware security and HRE.
We identify common topics, threat models, key pedagogical features, and course evaluation methods.
We suggest several possible improvements to HRE education and offer recommendations for developing new training courses.
arXiv Detail & Related papers (2024-11-08T14:23:04Z) - AI for ERW Detection in Clearance Operations -- The State of Research [12.278116747610158]
This article provides a literature review of academic research on AI for ERW detection for clearance operations.
It finds that research can be grouped into two main streams, AI for ERW object detection and AI for ERW risk prediction.
We develop three opportunities for future research, including a call for renewed efforts in the use of AI for ERW risk prediction.
arXiv Detail & Related papers (2024-10-31T11:50:29Z) - Safetywashing: Do AI Safety Benchmarks Actually Measure Safety Progress? [59.96471873997733]
We propose an empirical foundation for developing more meaningful safety metrics and define AI safety in a machine learning research context.
We aim to provide a more rigorous framework for AI safety research, advancing the science of safety evaluations and clarifying the path towards measurable progress.
arXiv Detail & Related papers (2024-07-31T17:59:24Z) - Requirements for a Career in Information Security: A Comprehensive
Review [0.0]
The primary objective is to increase public awareness regarding the diverse opportunities available in the Information Security (IS) field.
Thematic analysis was conducted on these studies to identify and delineate the crucial knowledge and skills that an IS professional should possess.
The study recognizes the existence of gender-related obstacles for women pursuing cybersecurity careers due to the field's unique requirements.
arXiv Detail & Related papers (2024-01-07T16:41:13Z) - On the Opportunities of Green Computing: A Survey [80.21955522431168]
Artificial Intelligence (AI) has achieved significant advancements in technology and research with the development over several decades.
The needs for high computing power brings higher carbon emission and undermines research fairness.
To tackle the challenges of computing resources and environmental impact of AI, Green Computing has become a hot research topic.
arXiv Detail & Related papers (2023-11-01T11:16:41Z) - REVERSIM: A Game-Based Environment to Study Human Aspects in Hardware Reverse Engineering [5.468342362048975]
Hardware Reverse Engineering (HRE) is a technique for analyzing Integrated Circuits (ICs)
We have developed REVERSIM, a game-based environment that mimics realistic HRE subprocesses and can integrate standardized cognitive tests.
REVERSIM enables quantitative studies with easier-to-recruit non-experts to uncover cognitive factors relevant to HRE.
arXiv Detail & Related papers (2023-09-11T18:03:50Z) - Towards Quantum Federated Learning [80.1976558772771]
Quantum Federated Learning aims to enhance privacy, security, and efficiency in the learning process.
We aim to provide a comprehensive understanding of the principles, techniques, and emerging applications of QFL.
As the field of QFL continues to progress, we can anticipate further breakthroughs and applications across various industries.
arXiv Detail & Related papers (2023-06-16T15:40:21Z) - On the Security Risks of Knowledge Graph Reasoning [71.64027889145261]
We systematize the security threats to KGR according to the adversary's objectives, knowledge, and attack vectors.
We present ROAR, a new class of attacks that instantiate a variety of such threats.
We explore potential countermeasures against ROAR, including filtering of potentially poisoning knowledge and training with adversarially augmented queries.
arXiv Detail & Related papers (2023-05-03T18:47:42Z) - Artificial Intelligence for IT Operations (AIOPS) Workshop White Paper [50.25428141435537]
Artificial Intelligence for IT Operations (AIOps) is an emerging interdisciplinary field arising in the intersection between machine learning, big data, streaming analytics, and the management of IT operations.
Main aim of the AIOPS workshop is to bring together researchers from both academia and industry to present their experiences, results, and work in progress in this field.
arXiv Detail & Related papers (2021-01-15T10:43:10Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.