HEXON: Protecting Firmware Using Hardware-Assisted Execution-Level Obfuscation.
Muhammad Monir HossainSajeed MohammadJason VosatkaJeffery S. AllenMonica AllenFarimah FarahmandiFahim RahmanMark M. TehranipoorPublished in: ISVLSI (2021)
Keyphrases
- real time
- control flow
- operating system
- computer systems
- low cost
- hardware and software
- ibm zenterprise
- reverse engineering
- computing systems
- access control
- information systems
- data flow
- error detection
- data processing
- wireless sensor networks
- levels of abstraction
- static analysis
- neural network
- application level
- data sets