Security and Complexity Analysis of LUT-based Obfuscation: From Blueprint to Reality.
Gaurav KolheHadi Mardani KamaliMiklesh NaickerTyler David SheavesHamid MahmoodiSai Manoj P. D.Houman HomayounSetareh RafatiradAvesta SasanPublished in: ICCAD (2019)
Keyphrases
- complexity analysis
- theoretical analysis
- malware detection
- lower bound
- computational complexity
- security policies
- access control
- security problems
- intrusion detection
- security mechanisms
- security management
- computer security
- statistical databases
- security issues
- security systems
- security requirements
- machine learning
- network security
- information security
- first order logic
- reverse engineering
- key management
- security analysis
- security threats
- data privacy
- security protocols
- privacy preserving
- digital images
- unauthorized access