Threshold-Dependent Camouflaged Cells to Secure Circuits Against Reverse Engineering Attacks.
Maria I. Mera CollantesMohamed El MassadSiddharth GargPublished in: CoRR (2016)
Keyphrases
- reverse engineering
- security mechanisms
- secure routing
- cryptographic protocols
- security protocols
- malicious code
- software engineering
- stream cipher
- chosen plaintext
- security measures
- dynamic analysis
- software maintenance
- program understanding
- block cipher
- conceptual schema
- countermeasures
- information leakage
- reverse engineer
- gene regulatory networks
- software evolution
- security requirements
- object oriented
- software engineers
- advanced encryption standard
- legacy systems
- security issues
- unauthorized access
- security analysis
- information systems
- artificial intelligence
- smart card
- watermarking scheme
- threshold values
- standard model
- business rules