CAPTIVE: Constrained Adversarial Perturbations to Thwart IC Reverse Engineering.
Amir Hosein Afandizadeh ZargariMarzieh AshrafiamiriMinjun SeoSai Manoj Pudukotai DinakarraoMohammed E. FoudaFadi J. KurdahiPublished in: Inf. (2023)
Keyphrases
- reverse engineering
- software engineering
- dynamic analysis
- reverse engineer
- object oriented
- software maintenance
- software product
- software evolution
- business rules
- computer aided design
- gene regulatory networks
- genetic regulatory networks
- conceptual schema
- program understanding
- machine learning
- software engineers
- integrated circuit
- development process
- platform independent
- software systems
- legacy systems
- open source
- bayesian networks