Login / Signup
System-Level Methods to Prevent Reverse-Engineering, Cloning, and Trojan Insertion.
Sylvain Guilley
Jean-Luc Danger
Robert Nguyen
Philippe Nguyen
Published in:
ICISTM (2012)
Keyphrases
</>
reverse engineering
databases
significant improvement
database
software maintenance