Login / Signup
ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow.
Sharareh Zamanzadeh
Ali Jahanian
Published in:
ISC Int. J. Inf. Secur. (2016)
Keyphrases
</>
reverse engineering
reverse engineer
design process
case study
conceptual schema
data model
software engineering
single chip
source code
conceptual model
information systems
software maintenance
design methodology
platform independent
legacy systems
program slicing
artificial intelligence