Logic Obfuscation against IC Reverse Engineering Attacks Using PLGs.
Qutaiba AlasadJiann-Shiun YuanPublished in: ICCD (2017)
Keyphrases
- reverse engineering
- malicious code
- software engineering
- dynamic analysis
- object oriented
- software maintenance
- software product
- reverse engineer
- business rules
- legacy systems
- program understanding
- gene regulatory networks
- integrated circuit
- databases
- conceptual schema
- watermarking scheme
- modal logic
- database
- platform independent
- software evolution
- computer aided design
- data model
- legacy software systems