Login / Signup

Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs.

G. SumathiL. SrivaniD. Thirugnana MurthyAnish KumarK. Madhusoodanan
Published in: SG-CRC (2017)
Keyphrases
  • reverse engineering
  • static analysis
  • control flow
  • malware detection
  • data transformation
  • low cost
  • real time
  • learning algorithm
  • information systems
  • computing power
  • database systems
  • hardware implementation