Developing Anti-tamper Functionalities through Continuous Integration
暂无分享,去创建一个
[1] Jari-Matti Mäkelä,et al. Diversification and obfuscation techniques for software security: A systematic literature review , 2018, Inf. Softw. Technol..
[2] Maya Gokhale,et al. Trident: From High-Level Language to Hardware Circuitry , 2007, Computer.
[3] Keith D. Underwood,et al. FPGAs vs. CPUs: trends in peak floating-point performance , 2004, FPGA '04.
[4] P. Sojan Lal,et al. JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes , 2009, COMPUTE '09.
[5] David Aucsmith,et al. Tamper Resistant Software: An Implementation , 1996, Information Hiding.
[6] Yeonseung Ryu,et al. A FPGA-Based Scheme for Protecting Weapon System Software Technology , 2018, ICCSA.
[7] Arthur F Huber,et al. The Role and Nature of Anti-Tamper Techniques in U.S. Defense Acquisition , 1999 .
[8] Yang Le,et al. Research on Java Bytecode Parse and Obfuscate Tool , 2012, 2012 International Conference on Computer Science and Service System.
[9] Atsuko Miyaji,et al. Software Obfuscation on a Theoretical Basis and Its Implementation , 2003, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.
[10] Fei Hu,et al. Security and Privacy in Internet of Things (Iots): Models, Algorithms, and Implementations , 2016 .
[11] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[12] Louise H. Crockett,et al. The Zynq Book: Embedded Processing with the Arm Cortex-A9 on the Xilinx Zynq-7000 All Programmable Soc , 2014 .
[13] Pong P. Chu. FPGA prototyping by VHDL examples , 2008 .