Cited By
View all- Fell APham HLam SShibuya T(2019)TADProceedings of the 24th Asia and South Pacific Design Automation Conference10.1145/3287624.3287694(58-63)Online publication date: 21-Jan-2019
Code obfuscation is used to reduce legibility of the code, and protect the critical code information from being stolen by reverse engineering. For the characteristic that obfuscation can be used for assembly and source code, the main method and principle ...
Soft processors are often used in FPGA-based systems because of their ease-of-use, but for a given computation there is a significant gap in area/performance between a C code implementation executing on a soft processor and a custom FPGA hardware ...
Malware writers and detectors have been running an endless battle. Self-defense is the weapon most malware writers prepare against malware detectors. Malware writers have tried to evade the improved detection techniques of anti-virus(AV) products. ...
EDA Consortium
San Jose, CA, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in