Login / Signup
Removal Attacks on Logic Locking and Camouflaging Techniques.
Muhammad Yasin
Bodhisatwa Mazumdar
Ozgur Sinanoglu
Jeyavijayan Rajendran
Published in:
IEEE Trans. Emerg. Top. Comput. (2020)
Keyphrases
</>
concurrency control
traffic analysis
logic programming
countermeasures
automated reasoning
classical logic
predicate logic
modal logic
proof theory
multi valued
malicious attacks
object oriented database management systems
database
malicious users
watermarking scheme
data structure
neural network