Libros importados hasta 50% OFF + Envío Gratis a todo USA  Ver más

menu

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada Component Hiding Using Identification and Boundary Blurring Techniques (in English)
Type
Physical Book
Publisher
Language
Inglés
Pages
144
Format
Paperback
Dimensions
24.6 x 18.9 x 0.8 cm
Weight
0.27 kg.
ISBN13
9781288409303
Categories

Component Hiding Using Identification and Boundary Blurring Techniques (in English)

James D. Parham (Author) · Biblioscholar · Paperback

Component Hiding Using Identification and Boundary Blurring Techniques (in English) - Parham, James D.

Physical Book

$ 48.80

$ 57.95

You save: $ 9.15

16% discount
  • Condition: New
It will be shipped from our warehouse between Tuesday, July 02 and Wednesday, July 03.
You will receive it anywhere in United States between 1 and 3 business days after shipment.

Synopsis "Component Hiding Using Identification and Boundary Blurring Techniques (in English)"

Protecting software from adversarial attacks is extremely important for DoD technologies. When systems are compromised, the possibility exists for recovery costing millions of dollars and countless labor hours. Circuits implemented on embedded systems utilizing FPGA technology are the result of downloading software for instantiating circuits with specific functions or components. We consider the problem of component hiding a form of software protection. Component identification is a well studied problem. However, we use component identification as a metric for driving the cost of reverse engineering to an unreasonable level. We contribute to protection of software and circuitry by implementing a Java based component identification tool. With this tool, we can characterize time required for carrying out adversarial attacks on unaltered boolean circuitry. To counter component identification methods we utilize boundary blurring techniques which are either semantic preserving or semantic changing in order to prevent component identification methods. Furthermore, we will show these techniques can drive adversarial cost to unreasonable levels preventing compromise of critical systems.

Customers reviews

More customer reviews
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Frequently Asked Questions about the Book

All books in our catalog are Original.
The book is written in English.
The binding of this edition is Paperback.

Questions and Answers about the Book

Do you have a question about the book? Login to be able to add your own question.

Opinions about Bookdelivery

More customer reviews