Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
reverse engineering
biblio
Algorithmic information theory for obfuscation security
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
Code Obfuscation
Complexity theory
encoding
Intellectual Property Protection
Kolmogorov Complexity
Measurement
pubcrawl170107
reverse engineering
security
Software
biblio
Reverse Engineering Digital Circuits Using Structural and Functional Analyses
Submitted by BrandonB on Wed, 05/06/2015 - 10:42am
reverse engineering
integrated circuit design
integrated circuits
intellectual property
invasive software
IP theft
IP violation detection
Logic gates
register files
Inference algorithms
SoC design
structural analysis
subtractors
system-on-chip
test circuits
Trojan horses
unstructured netlist
very large highly-optimized system-on-chip design
functional analysis
Algorithm design and analysis
algorithmic reverse engineering digital circuits
combinational elements
computer security
counters
design automation
Digital circuits
formal verification
adders
Globalization
globalized multivendor environment
Hardware
hardware trojans-malware
high-level netlist
ICs
industrial property
biblio
On application of one-class SVM to reverse engineering-based hardware Trojan detection
Submitted by BrandonB on Wed, 05/06/2015 - 10:35am
one-class support vector machine
well-studied machine learning method
Trojan-free IC identification
Trojan horses
Training
test-time detection approach
Support vector machines
reverse engineering-based hardware Trojan detection
reverse engineering
one-class SVM
electronic engineering computing
learning (artificial intelligence)
Layout
invasive software
integrated circuits
Integrated circuit modeling
integrated circuit design
golden model
feature extraction
fabrication outsourcing
biblio
A New Code Obfuscation Scheme for Software Protection
Submitted by BrandonB on Fri, 05/01/2015 - 6:57am
malicious reverse engineering
tampering
systems re-engineering
software protection
software engineering
Software
security attacks
reverse engineering
Resists
Resistance
nontrivial code clones
Cloning
Licenses
IT industry
Data processing
Computer crime
Complexity theory
code transformation
code patterns
code obfuscation scheme
code fragment cloning
biblio
Moving target defense for adaptive adversaries
Submitted by Heather Lucas on Wed, 09/17/2014 - 5:33pm
moving target defense
Unsolicited electronic mail
Training
Switches
standard static methods
security problems
security of data
security applications
security
reverse-engineer
reverse engineering
performance evaluation
adaptive adversaries
ML algorithms
malicious activities
machine learning
learning (artificial intelligence)
innocent activities
hybrid dynamical systems
Games
flexible MT defense strategy
cyber security
Biological system modeling
algorithm performance degradation
« first
‹ previous
1
2
3
4
5
6
7
8