共 50 条
- [3] Evaluation of Hardware Obfuscation Techniques using Obfuscation Tool oLLVM IEEJ Transactions on Industry Applications, 2019, 139 (02): : 111 - 118
- [4] Positive results and techniques for obfuscation ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 20 - 39
- [5] Eavesdropping and Obfuscation Techniques for Smartphones 2016 IEEE/ACM INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT 2016), 2016, : 291 - 292
- [6] Assessment of Source Code Obfuscation Techniques 2016 IEEE 16TH INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM), 2016, : 11 - 20
- [8] Attacks on Logic Locking Obfuscation Techniques 2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2021,
- [9] Digital evidence obfuscation: Recovery techniques Sensors, and Command, Control, Communications, and Intelligence (C31) Technologies for Homeland Security and Homeland Defense IV, Pts 1 and 2, 2005, 5778 : 587 - 594