Promoting the Acquisition of Hardware Reverse Engineering Skills

被引:5
作者
Wiesen, Carina [1 ,2 ]
Becker, Steffen [2 ]
Albartus, Nils [2 ]
Paar, Christof [2 ]
Rummel, Nikol [1 ,2 ]
机构
[1] Ruhr Univ Bochum, Inst Educ Res, Bochum, Germany
[2] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
来源
2019 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE 2019) | 2019年
关键词
skill acquisition in cyher security; hardware reverse engineering; COUNTERFEIT INTEGRATED-CIRCUITS; MOTIVATION; MODELS;
D O I
10.1109/fie43999.2019.9028668
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
This full research paper focuses on skill acquisition in Hardware Reverse Engineering (HRE) an important field of cyber security. LIRE is a prevalent technique routinely employed by security engineers (i) to detect malicious hardware manipulations, (ii) to conduct VLSI failure analysis, (iii) to identify IP infringements, and (iv) to perform competitive analyses. Even though the scientific community and industry have a high demand for HRE experts, there is a lack of educational courses. We developed a university-level HRE course based on general cognitive psychological research on skill acquisition, as research on the acquisition of HRE skills is lacking thus far. To investigate how novices acquire HRE skills in our course, we conducted two studies with students on different levels of prior knowledge. Our results show that cognitive factors (e.g., working memory), and prior experiences (e.g., in symmetric cryptography) influence the acquisition of HRE skills. We conclude by discussing implications for future HRE courses and by outlining ideas for future research that would lead to a more comprehensive understanding of skill acquisition in this important field of cyber security.
引用
收藏
页数:9
相关论文
共 43 条
[1]  
Ambrose S. A., 2010, How learning works: Seven research-based principles for smart teaching
[2]   ACQUISITION OF COGNITIVE SKILL [J].
ANDERSON, JR .
PSYCHOLOGICAL REVIEW, 1982, 89 (04) :369-406
[3]  
[Anonymous], IVSW
[4]  
[Anonymous], 1972, Perceived item-difficulty in three tests of intellectual performance capacity Report
[5]  
[Anonymous], SPART 6 FPGA CONF LO
[6]  
[Anonymous], 2008, Working Memory and Academic Learning: Assessment and Intervention
[7]  
[Anonymous], 2017, Introduction to hardware obfuscation: Motivation, methods and evaluation, Hardware Protection through Obfuscation
[8]  
[Anonymous], IVSW
[9]   Working memory [J].
Baddeley, Alan .
CURRENT BIOLOGY, 2010, 20 (04) :R136-R140
[10]   The fractionation of working memory [J].
Baddeley, A .
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 1996, 93 (24) :13468-13472