• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 188
  • 32
  • 30
  • 21
  • 16
  • 10
  • 9
  • 6
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 384
  • 384
  • 96
  • 91
  • 59
  • 55
  • 49
  • 44
  • 36
  • 34
  • 33
  • 33
  • 30
  • 29
  • 27
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
101

Applications of subdivision techniques in product development

Gross, Nele. Unknown Date (has links) (PDF)
Techn. University, Diss., 2003--Berlin.
102

Reverse engineering of a malware eyeing the future of security

Burji, Supreeth Jagadish. January 2009 (has links)
Thesis (M.S.)--University of Akron, Dept. of Computer Science, 2009. / "August, 2009." Title from electronic thesis title page (viewed 11/11/2009) Advisor, Kathy J. Liszka; Faculty Readers, Timothy W. O'Neil, Wolfgang Pelz; Department Chair, Chien-Chung Chan; Dean of the College, Chand Midha; Dean of the Graduate School, George R. Newkome. Includes bibliographical references.
103

Integration of a Standard-Based Quality Assessment into the VizzAnalyzer

Ruiz de Azua, David January 2006 (has links)
More than half of the total costs in ownership of a software system are maintenance costs. Reverse engineering is becoming more important and complex for huge systems, and tools for reverse engineering are necessary for system evaluation. The ISO/IEC 9126 standard defines software quality and The VizzAnalyzer Framework is a stand-alone tool for analyzing and visualizing large software systems’ structures. In this thesis, we describe the design and implementation of plug-ins for the VizzAnalyzer Framework, a system for reverse engineering, extending their features under the standards of software quality. It has proven to be useful in applying the new features into the VizzAnalyzer Framework being the first tool that includes a software quality model.
104

Reverse Engineering of Corinthian Pigment Processing and Firing Technologies on Archaic Polychrome Ceramics

Klesner, Catherine Elizabeth, Klesner, Catherine Elizabeth January 2017 (has links)
Decorative, polychrome ceramics from Corinth, Greece, produced during the 8th-6th centuries B.C.E. are luxury goods that were widely traded throughout Greece and the Mediterranean. The decorated ceramics were produced in a variety of shapes, including aryballos, alabastron, and olpe. They were decorated with slip-glazes in distinctive white, black, red, yellow, and purple colors, and in a variety of surface finishes, matte, semi-matte and glossy. Artisans in Corinthian workshops experimented to change the colors of the slips by varying the type and amount of iron-rich raw materials. They also varied the composition of the clay used as a binder and the amount of flux used as a sintering aid to promote glass formation. This research reconstructs the technology used by the Corinthian craftsmen to produce the Archaic polychrome ceramics, and shows how these technologies differed from the production of better known, more prestigious Athenian black-figure and red-figure ceramics. Through microstructural examination of archaeological samples and replication experiments, this thesis proposes that the purple iron oxide pigment is the result of acid treatment and oxidation of iron metal. The firing temperature range of the Corinthian polychrome ceramics was determined experimentally to be 925-1025° C, which is higher than previously reported and similar to that reported for Corinthian transport amphoras. The firing range is higher by 50-150° C than the Athenian black-figure and red-figure ceramics. Samples of Corinthian polychrome and Athenian black-figure ceramics from the Marie Farnsworth collection at the University of Arizona were tested and compared to Corinthian clay collections. Analytical techniques included Fourier-transform infrared spectroscopy (FTIR), scanning-electron microscopy with energy-dispersive spectroscopy (SEM-EDS), micro-Raman spectroscopy, and wavelength-dispersive electron microprobe (EPMA with BSE-SEM).
105

Reverse Engineering : En jämförelse mellan företag och forskare

Grahn, Pernilla January 2004 (has links)
Användning av mjukvaruverktyg när reverse engineering utförs är ett måste för att få ett användbart resultat enligt Hainaut (2002). Kudrass m fl (1997) visar på brister som kan uppstå när mjukvaruverktyg används. Gemensamt för de forskare som har studerats i detta arbete är att de hävdar att företag saknar kunskap för att utföra reverse engineering med mjukvaruverktyg. Har forskarna rätt i att det saknas kunskap eller har företagen mer kunskap än vad forskarna tror? Då dessa forskare har en klar koppling till tillverkning av mjukvaruverktyg så är eventuellt inte deras påstående opartiska och därför är det intressant att se om deras påstående stämmer med verkligheten. För att undersöka hur mycket kunskap olika företag har om utförande av reverse engineering har intervjuer utförts för att få fram information som sedan jämfördes med forskarnas påstående. Av de företag som deltog i denna undersökning blev resultatet att forskarnas påstående inte kunde styrkas, det finns ingen kunskapsbrist på svenska företag idag inom reverse engineering. Och den naturliga kopplingen mellan mjukvaruverktyg och reverse engineering är mer framtvingad av leverantörer än naturlig för företagen, enligt några av de företag som deltog. Eftersom detta arbete är begränsat i tid så kan inte resultatet som har framkommit ses som att forskarna har rätt eller fel utan bara visa en liten del av vad företagen har för kunskap inom reverse engineering.
106

Methodologies to Exploit ATPG Tools for De-camouflaging

Vontela, Deepak Reddy 26 October 2016 (has links)
Semiconductor supply chain is increasingly getting exposed to Reverse Engineering (RE) of Intellectual Property (IP). Camouflaging of gates in integrated circuits are typically employed to hide the gate functionality to prevent reverse engineering. The functionalities of these gates cannot be found by De-layering as they don’t leave any layout clues. Adversaries perform reverse engineering by replacing the camouflaged gate with the known gate and by developing custom software to determine test patterns. These test patterns are used to analyze the outputs and to conclude the functionality of the camouflaged gate. In this thesis, we show that reverse engineering of camouflaged design can be performed by exploiting the test features of commercial/publicly available Automatic Test Pattern Generation (ATPG) tools. We also propose controllability/observability and Hamming Distance sensitivity based metric to select target gates for camouflaging. Simulations on ISCAS85 benchmarks shows that the proposed techniques can increase the reverse engineering effort significantly by camouflaging small fraction of gates.
107

Digitalizace trupu ultralehkého letounu pro technologii výroby přesných forem / Digitalization of ultra-light plane fuselage for production of accurate mould

Véle, Filip January 2009 (has links)
This work describes digitalization and creation of ultralight aircraft 3D model in order to create accurate moulds for fuselage lamination. Right choice of technology is based on background research. Designed procedures are described in detail as well as used equipment, hardware and software. Objective of this project is application of available methods of digitalization to create 3D aircraft model and its usage for accurate mould design.
108

Automatically Inferring Image Bases of ARM32 Binaries

Chong, Daniel T. 26 May 2022 (has links)
No description available.
109

Multi-Dimensional Identification of Vulnerable Access Control in Mobile Applications

Chaoshun, Zuo January 2020 (has links)
No description available.
110

A Novel Attack Method Against Split Manufactured Circuits

Liu, Rongrong January 2019 (has links)
No description available.

Page generated in 0.105 seconds