Login / Signup
Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs.
G. Sumathi
L. Srivani
D. Thirugnana Murthy
Anish Kumar
K. Madhusoodanan
Published in:
SG-CRC (2017)
Keyphrases
</>
reverse engineering
static analysis
control flow
malware detection
data transformation
low cost
real time
learning algorithm
information systems
computing power
database systems
hardware implementation