3. Protection against reverse engineering and cloning
3.1 Microelectronic protection
As we saw in section 1.4 , reverse engineering involves a number of more or less invasive attack techniques against which...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Protection against reverse engineering and cloning
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!