With current tools and technology, someone who has physical access to a chip can extract the detailed layout of the integrated circuit (IC). By using advanced visual imaging techniques, reverse engineering can reveal details that are meant to be kept secret, such as a s... View more
 Chipworks, “Reverse Engineering Software.” http://www.chipworks.com/ en/technical-competitive-analysis/resources/reerse-engineering-software. Last accessed May 2014.
 Degate, “Reverse engineering integrated circuits with degate.” http://www. degate.org/documentation/. Last accessed May 2014.
 Chipworks, “Inside the Apple Lightning Cable.” http://www. chipworks.com/en/technical-competitive-analysis/resources/blog/ inside-the-apple-lightning-cable/, Oct. 2012.
 SypherMedia, “Syphermedia library circuit camouflage technology.” http: //www.smi.tv/solutions.htm. Last accessed May 2014.
 J. Rajendran, M. Sam, O. Sinanoglu, and R. Karri, “Security Analysis of Integrated Circuit Camouflaging,” in Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS '13, (New York, NY, USA), pp. 709-720, ACM, 2013.
 J. Kao, A. Chandrakasan, and D. Antoniadis, “Transistor sizing issues and tool for multi-threshold cmos technology,” in Proceedings of the 34th annual Design Automation Conference, pp. 409-414, ACM, 1997.
 Y. Huang, C. Williams, and H. Smith, “Direct comparison of crosssectional scanning capacitance microscope dopant profile and vertical secondary ion-mass spectroscopy profile,” Journal of Vacuum Science & Technology B, vol. 14, no. 1, pp. 433-436, 1996.
 R. Torrance and D. James, “Reverse engineering in the semiconductor industry,” in Custom Integrated Circuits Conference, 2007. CICC'07. IEEE, pp. 429-436, IEEE, 2007.
 L. Sekanina, R. Ruzicka, Z. Vasicek, R. Prokop, and L. Fujcik, “Repomo32-new reconfigurable polymorphic integrated circuit for adaptive hardware,” in Evolvable and Adaptive Hardware, 2009. WEAH'09. IEEE Workshop on, pp. 39-46, IEEE, 2009.