共 50 条
- [2] SoK: An Overview of Algorithmic Methods in IC Reverse Engineering [J]. PROCEEDINGS OF THE 3RD ACM WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY WORKSHOP (ASHES '19), 2019, : 65 - 74
- [3] Sok: An overview of algorithmic methods in IC reverse engineering [J]. Proceedings of the ACM Conference on Computer and Communications Security, 2019, : 65 - 74
- [4] Protocol Reverse-Engineering Methods and Tools: A Survey [J]. COMPUTER COMMUNICATIONS, 2022, 182 : 238 - 254
- [5] Survey on Network Protocol Reverse Engineering Approaches, Methods and Tools [J]. 2017 19TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS 2017): MANAGING A WORLD OF THINGS, 2017, : 271 - 274
- [7] The State-of-the-Art in IC Reverse Engineering [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 363 - 381
- [8] A Fast and Flexible Software for IC Reverse Engineering [J]. 2018 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2018, : 46 - 49
- [10] The power of ic reverse engineering for hardware trust and assurance [J]. Electronic Device Failure Analysis, 2019, 21 (02): : 30 - 36