Brunner, MichaelaMichaelaBrunnerLee, Hye HyunHye HyunLeeHepp, AlexanderAlexanderHeppBaehr, JohannaJohannaBaehrSigl, GeorgGeorgSigl2025-01-172025-01-172024-01-01https://publica.fraunhofer.de/handle/publica/48142410.1109/DDECS60919.2024.105089242-s2.0-85192813807Reverse engineering (RE) of finite state machines (FSMs) is a serious threat when protecting designs against RE attacks. While most recent protection techniques rely on the security of a secret key, this work presents a new approach: hardware FSM honeypots. These honeypots lead the RE tools to a wrong but, for the tools, very attractive FSM, while making the original FSM less attractive. The results show that state-of-the-art RE methods favor the highly attractive honeypot as FSM candidate or do no longer detect the correct, original FSM.enfalseIC trustnetlist reverse engineeringstate machine obfuscationhoneypot600 Technik, Medizin, angewandte WissenschaftenHardware Honeypot: Setting Sequential Reverse Engineering on a Wrong Trackconference paper