Component Hiding Using Identification and Boundary Blurring Techniques
James D. Parham
Broschiertes Buch

Component Hiding Using Identification and Boundary Blurring Techniques

Versandkostenfrei!
Versandfertig in über 4 Wochen
54,99 €
inkl. MwSt.
PAYBACK Punkte
27 °P sammeln!
Protecting software from adversarial attacks is extremely important for DoD technologies. When systems are compromised, the possibility exists for recovery costing millions of dollars and countless labor hours. Circuits implemented on embedded systems utilizing FPGA technology are the result of downloading software for instantiating circuits with specific functions or components. We consider the problem of component hiding a form of software protection. Component identification is a well studied problem. However, we use component identification as a metric for driving the cost of reverse engin...