Vyzkoušejte nový nástroj s podporou AI
  
        
        Summon Research Assistant
        BETA
      
                    
  
      
    A meta-model for software protections and reverse engineering attacks
                                      
                                            Basile, Cataldo,                              Canavese, Daniele,                              Regano, Leonardo,                              Falcarin, Paolo,                              Sutter, Bjorn De                              
Published in The Journal of systems and software (01.04.2019)
                   
      
      
                                                  Published in The Journal of systems and software (01.04.2019)
Get full text
              Journal Article
          
              
          ObNoCs: Protecting Network-on-Chip Fabrics Against Reverse-Engineering Attacks
                                      
                                            Halder, Dipal,                              Merugu, Maneesh,                              Ray, Sandip                              
Published in ACM transactions on embedded computing systems (09.09.2023)
                   
      
      
                                                  Published in ACM transactions on embedded computing systems (09.09.2023)
Get full text
              Journal Article
          
              
          Thwarting Reverse Engineering Attacks through Keyless Logic Obfuscation
Get full text
              Conference Proceeding
          
              
          ClearLock: Deterring Hardware Reverse Engineering Attacks in a White-Box
Get full text
              Conference Proceeding
          
              
          AI-Driven Assurance of Hardware IP against Reverse Engineering Attacks
                                      
                                            Chakraborty, Prabuddha,                              Bhunia, Swarup                              
Published in Proceedings - International Test Conference (01.09.2022)
                   
      
      
                                                  Published in Proceedings - International Test Conference (01.09.2022)
Get full text
              Conference Proceeding
          
              
          Hardening Circuit-Design IP Against Reverse-Engineering Attacks
                                      
                                            Chhotaray, Animesh,                              Shrimpton, Thomas                              
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2022)
                   
      
      
                                                  Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2022)
Get full text
              Conference Proceeding
          
              
          DNNCloak: Secure DNN Models Against Memory Side-channel Based Reverse Engineering Attacks
                                      
                                            Che, Yuezhi,                              Wang, Rujia                              
Published in Proceedings - IEEE International Conference on Computer Design (01.10.2022)
                   
      
      
                                                  Published in Proceedings - IEEE International Conference on Computer Design (01.10.2022)
Get full text
              Conference Proceeding
          
              
          Mitigating Reverse Engineering Attacks on Deep Neural Networks
                                      
                                            Liu, Yuntao,                              Dachman-Soled, Dana,                              Srivastava, Ankur                              
Published in Proceedings / IEEE Computer Society Annual Symposium on VLSI (01.07.2019)
                   
      
      
                                                  Published in Proceedings / IEEE Computer Society Annual Symposium on VLSI (01.07.2019)
Get full text
              Conference Proceeding
          
              
          Logic Obfuscation against IC Reverse Engineering Attacks Using PLGs
                                      
                                            Alasad, Qutaiba,                              Yuan, Jiann                              
Published in Proceedings - IEEE International Conference on Computer Design (01.11.2017)
                   
      
      
                                                  Published in Proceedings - IEEE International Conference on Computer Design (01.11.2017)
Get full text
              Conference Proceeding
          
              
          A Survey on Side-Channel-based Reverse Engineering Attacks on Deep Neural Networks
                                      
                                            Liu, Yuntao,                              Zuzak, Michael,                              Xing, Daniel,                              McDaniel, Isaac,                              Mittu, Priya,                              Ozbay, Olsan,                              Akib, Abir,                              Srivastava, Ankur                              
Published in 2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS) (13.06.2022)
                   
      
      
                                                  Published in 2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS) (13.06.2022)
Get full text
              Conference Proceeding
          
              
          FineObfuscator: Defeating Reverse Engineering Attacks with Context-sensitive and Cost-efficient Obfuscation for Android Apps
                                      
                                            Dharmalingam, Balakrishnan,                              Liu, Anyi,                              Ganesan, Subra,                              Roy, Sankardas                              
Published in IEEE International Conference on Electro Information Technology (19.05.2022)
                   
      
      
                                                  Published in IEEE International Conference on Electro Information Technology (19.05.2022)
Get full text
              Conference Proceeding
          
              
          Resilient and Secure Hardware Devices Using ASL
                                      
                                            Alasad, Qutaiba,                              Lin, Jie,                              Yuan, Jiann-Shuin,                              Fan, Deliang,                              Awad, Amro                              
Published in ACM journal on emerging technologies in computing systems (30.04.2021)
                   
      
      
                                                  Published in ACM journal on emerging technologies in computing systems (30.04.2021)
Get full text
              Journal Article