Higher security of ASIC fabrication process against reverse engineering attack using automatic netlist encryption methodology.
Sharareh ZamanzadehAli JahanianPublished in: Microprocess. Microsystems (2016)
Keyphrases
- reverse engineering
- integrated circuit
- reverse engineer
- software product
- software engineering
- encryption decryption
- access control
- software maintenance
- key management
- object oriented
- conceptual model
- gene regulatory networks
- database systems
- secret key
- encryption algorithms
- data encryption
- security properties
- encryption algorithm
- authentication protocol
- data model