Component Hiding Using Identification And Boundary Blurring Techniques by James D Parham, Paperback | Indigo Chapters
Component Hiding Using Identification And Boundary Blurring Techniques by James D Parham, Paperback | Indigo Chapters

Coles

Component Hiding Using Identification And Boundary Blurring Techniques by James D Parham, Paperback | Indigo Chapters

From James D Parham

Current price: $60.51
Loading Inventory...

Size: 0.31 x 9.69 x 0.59

Visit retailer's website
*Product information may vary - to confirm product availability, pricing, and additional information please contact Coles
Protecting software from adversarial attacks is extremely important for DoD technologies. When systems are compromised, the possibility exists for recovery costing millions of dollars and countless labor hours. Circuits implemented on embedded systems utilizing FPGA technology are the result of downloading software for instantiating circuits with specific functions or components. We consider the problem of component hiding a form of software protection. Component identification is a well studied problem. However, we use component identification as a metric for driving the cost of reverse engineering to an unreasonable level. We contribute to protection of software and circuitry by implementing a Java based component identification tool. With this tool, we can characterize time required for carrying out adversarial attacks on unaltered boolean circuitry. To counter component identification methods we utilize boundary blurring techniques which are either semantic preserving or semantic changing in order to prevent component identification methods. Furthermore, we will show these techniques can drive adversarial cost to unreasonable levels preventing compromise of critical systems. | Component Hiding Using Identification And Boundary Blurring Techniques by James D Parham, Paperback | Indigo Chapters

More About Coles at Bramalea City Centre

Making Connections. Creating Experiences. We exist to add a little joy to our customers’ lives, each time they interact with us.

Powered by Adeptmind