On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering.
Jakub BreierDirmanto JapXiaolu HouShivam BhasinPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- reverse engineering
- software engineering
- software maintenance
- dynamic analysis
- countermeasures
- gene regulatory networks
- program understanding
- software product
- conceptual schema
- object oriented
- legacy systems
- business rules
- information security
- computer aided design
- genetic regulatory networks
- software evolution
- reverse engineer
- machine learning
- protection schemes
- block cipher
- software engineers
- feature selection
- artificial intelligence