Login / Signup
Large-Scale Logic-Locking Attacks via Simulation.
Ruben Purdy
R. D. Shawn Blanton
Published in:
ISQED (2022)
Keyphrases
</>
real world
simulation model
simulation environment
real life
logic programming
small scale
malicious attacks
databases
data mining
database systems
access control
simulation study
concurrency control
modal logic
countermeasures
security risks