The working principles of ESP32 and analytical comparison of using low-cost microcontroller modules in embedded systems design H Kareem, D Dunaev 2021 4th International Conference on Circuits, Systems and Simulation (ICCSS …, 2021 | 25 | 2021 |
Xilinx FPGA-based ring oscillator PUFs: design challenges and solutions H Kareem, D Dunaev 2022 11th Mediterranean Conference on Embedded Computing (MECO), 1-5, 2022 | 9 | 2022 |
Physical unclonable functions based hardware obfuscation techniques: a state of the art H Kareem, D Dunaev 2021 16th Iberian Conference on Information Systems and Technologies (CISTI …, 2021 | 9 | 2021 |
Obfuscation for protecting software from analysis and modification D Dunaev Proceedings of the Automation and Applied Computer Science Workshop, 290-296, 2011 | 8 | 2011 |
Complexity of a special deobfuscation problem D Dunaev, L Lengyel Engineering of Computer Based Systems (ECBS), 2012 IEEE 19th International …, 2012 | 7 | 2012 |
Towards performance optimization of ring oscillator PUF using Xilinx FPGA H Kareem, D Dunaev 2022 17th Iberian Conference on Information Systems and Technologies (CISTI …, 2022 | 6 | 2022 |
Aspects of intermediate level obfuscation D Dunaev, L Lengyel 2013 3rd Eastern European Regional Conference on the Engineering of Computer …, 2013 | 6 | 2013 |
Matlab gui-based tool to determine performance metrics of physical unclonable functions H Kareem, K Almousa, D Dunaev 2022 Cybernetics & Informatics (K&I), 1-5, 2022 | 5 | 2022 |
Overview of an obfuscation algorithm D Dunaev, L Lengyel Proceedings of the International Conference on Computer Science and …, 2012 | 5 | 2012 |
A robust architecture of ring oscillator PUF: Enhancing cryptographic security with configurability H Kareem, D Dunaev Microelectronics Journal 143, 106022, 2024 | 4 | 2024 |
Formal considerations and a practical approach to intermediate-level obfuscation D Dunaev, L Lengyel WSEAS Transactions on Information Science and Applications 11, 32-41, 2014 | 4 | 2014 |
A method of machine code translation to intermediate representation D Dunaev, H Charaf, L Lengyel 2013 IEEE 4th International Conference on Cognitive Infocommunications …, 2013 | 4 | 2013 |
A novel low hardware configurable ring oscillator (CRO) PUF for lightweight security applications H Kareem, D Dunaev Microprocessors and Microsystems 104, 104989, 2024 | 3 | 2024 |
Cognitive evaluation of intermediate level obfuscator D Dunaev, L Lengyel 2014 5th IEEE Conference on Cognitive Infocommunications (CogInfoCom), 521-525, 2014 | 3 | 2014 |
An intermediate level obfuscation method D Dunaev, L Lengyel Acta Polytechnica Hungarica 11 (7), 179-195, 2014 | 3 | 2014 |
Input data analysis in intermediate level obfuscation algorithm D Dunaev, L Lengyel Proceedings of IX International Conference on Perspective Technologies and …, 2013 | 2 | 2013 |
Method of software obfuscation using Petri nets D Dunaev, L Lengyel Central European Conference on Information and Intelligent Systems, 242, 2013 | 2 | 2013 |
Actual problems of protecting programs from reverse engineering and modification D Dunaev, L Lengyel Proceedings of the 6th International Scientific and Technical Conference on …, 2011 | 2 | 2011 |
Security Shield as a New Approach to Security in Automated Systems D Dunaev, L Lengyel | 2 | 2011 |
Machine learning vulnerability assessment of ring oscillator physical unclonable functions H Kareem, D Dunaev 2023 International Conference on Control, Automation and Diagnosis (ICCAD), 1-5, 2023 | 1 | 2023 |