Hiding Vulnerabilities of Internet of Things Software Using Anti-Tamper Technique.
Ara HurJooeun KimYeonseung RyuPublished in: ICIIT (2019)
Keyphrases
- software development
- computer systems
- software systems
- software design
- open standards
- software tools
- software components
- security vulnerabilities
- security mechanisms
- key technologies
- neural network
- source code
- mobile devices
- ubiquitous computing
- information security
- software architecture
- software maintenance
- countermeasures
- lightweight
- software package
- open source