Protecting Reprogrammable Hardware with Polymorphic Circuit Variation ∗
暂无分享,去创建一个
[1] John P. Hayes,et al. Unveiling the ISCAS-85 Benchmarks: A Case Study in Reverse Engineering , 1999, IEEE Des. Test Comput..
[2] Roberto Giacobazzi,et al. Semantic-Based Code Obfuscation by Abstract Interpretation , 2005, ICALP.
[3] Patrick Cousot. Constructive design of a hierarchy of semantics of a transition system by abstract interpretation , 2002, Theor. Comput. Sci..
[4] Andrew Walenstein,et al. Statistical signatures for fast filtering of instruction-substituting metamorphic malware , 2007, WORM '07.
[5] Guy N. Rothblum,et al. On Best-Possible Obfuscation , 2007, TCC.
[6] Yuval Ishai,et al. Private Circuits: Securing Hardware against Probing Attacks , 2003, CRYPTO.
[7] A. Benjamin Premkumar,et al. Private stateful circuits secure against probing attacks , 2007, ASIACCS '07.
[8] Frederick B. Cohen,et al. Operating system protection through program evolution , 1993, Comput. Secur..
[9] Alec Yasinsac,et al. Of unicorns and random programs , 2005, Communications and Computer Networks.
[10] Alec Yasinsac,et al. Applications for Provably Secure Intent Protection with Bounded Input-Size Programs , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[11] A. Benjamin Premkumar,et al. Hiding Circuit Topology from Unbounded Reverse Engineers , 2006, ACISP.
[12] Ingrid Verbauwhede,et al. Design method for constant power consumption of differential logic circuits , 2005, Design, Automation and Test in Europe.
[13] Valentin Goranko,et al. Logic in Computer Science: Modelling and Reasoning About Systems , 2007, J. Log. Lang. Inf..
[14] Alec Yasinsac,et al. Software issues in digital forensics , 2008, OPSR.
[15] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[16] Andrew Walenstein,et al. Normalizing Metamorphic Malware Using Term Rewriting , 2006, 2006 Sixth IEEE International Workshop on Source Code Analysis and Manipulation.
[17] Alec Yasinsac,et al. Tamper Resistant Software Through Intent Protection , 2008, Int. J. Netw. Secur..
[18] Christian F. Tschudin,et al. On Software Protection via Function Hiding , 1998, Information Hiding.