Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis

The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats. For example, software and hardware have become highly susceptible to various threats, like reverse...

Full description

Saved in:
Bibliographic Details
Main Authors: Khaled Saleh, Dirar Darweesh, Omar Darwish, Eman Hammad, Fathi Amsaad
Format: Article
Language:English
Published: MDPI AG 2025-06-01
Series:Computers
Subjects:
Online Access:https://www.mdpi.com/2073-431X/14/7/251
Tags: Add Tag
No Tags, Be the first to tag this record!