Interlocking obfuscation for anti-tamper hardware.
Avinash R. DesaiMichael S. HsiaoChao WangLeyla NazhandaliT. Simin HallPublished in: CSIIRW (2013)
Keyphrases
- low cost
- hardware and software
- real time
- reverse engineering
- static analysis
- computing systems
- computer systems
- hardware implementation
- neural network
- image authentication
- control flow
- embedded systems
- data acquisition
- image processing
- personal computer
- operating system
- computational power
- data processing
- image quality
- hardware design
- hardware architecture
- digital circuits
- malware detection