TY - JOUR U1 - Zeitschriftenartikel, wissenschaftlich - begutachtet (reviewed) A1 - Erozan, Ahmet Turan A1 - Hefenbrock, Michael A1 - Beigl, Michael A1 - Aghassi-Hagmann, Jasmin A1 - Tahoori, Mehdi Baradaran T1 - Reverse Engineering of Printed Electronics Circuits: From Imaging to Netlist Extraction JF - IEEE Transactions on Information Forensics and Security N2 - Printed electronics (PE) circuits have several advantages over silicon counterparts for the applications where mechanical flexibility, extremely low-cost, large area, and custom fabrication are required. The custom (personalized) fabrication is a key feature of this technology, enabling customization per application, even in small quantities due to low-cost printing compared with lithography. However, the personalized and on-demand fabrication, the non-standard circuit design, and the limited number of printing layers with larger geometries compared with traditional silicon chip manufacturing open doors for new and unique reverse engineering (RE) schemes for this technology. In this paper, we present a robust RE methodology based on supervised machine learning, starting from image acquisition all the way to netlist extraction. The results show that the proposed RE methodology can reverse engineer the PE circuits with very limited manual effort and is robust against non-standard circuit design, customized layouts, and high variations resulting from the inherent properties of PE manufacturing processes. Y1 - 2019 SN - 1556-6013 (Print) SS - 1556-6013 (Print) SN - 1556-6021 (Online) SS - 1556-6021 (Online) U6 - https://doi.org/10.1109/TIFS.2019.2922237 DO - https://doi.org/10.1109/TIFS.2019.2922237 VL - 15 SP - 475 EP - 486 PB - IEEE CY - New York ER -