CAPTIVE: Constrained Adversarial Perturbations to Thwart IC Reverse Engineering.
Amir Hosein Afandizadeh ZargariMarzieh AshrafiamiriMinjun SeoSai Manoj Pudukotai DinakarraoMohammed E. FoudaFadi J. KurdahiPublished in: CoRR (2021)
Keyphrases
- reverse engineering
- dynamic analysis
- software engineering
- object oriented
- program understanding
- software maintenance
- integrated circuit
- business rules
- gene regulatory networks
- reverse engineer
- conceptual schema
- software evolution
- multi agent
- computer aided design
- platform independent
- legacy systems
- case study
- software product
- information systems
- databases