Threshold-Dependent Camouflaged Cells to Secure Circuits Against Reverse Engineering Attacks.
Maria I. Mera CollantesMohamed El MassadSiddharth GargPublished in: ISVLSI (2016)
Keyphrases
- reverse engineering
- secure routing
- security mechanisms
- stream cipher
- security protocols
- cryptographic protocols
- malicious code
- chosen plaintext
- software engineering
- security measures
- software maintenance
- dynamic analysis
- reverse engineer
- object oriented
- business rules
- information leakage
- countermeasures
- security issues
- unauthorized access
- gene regulatory networks
- conceptual schema
- legacy systems
- program understanding
- advanced encryption standard
- security requirements
- block cipher
- security analysis
- relational databases
- software engineers
- authentication protocol
- watermarking scheme
- artificial intelligence
- security policies
- program comprehension
- smart card
- software evolution