1 |
General Unpacking : Overview and TechniquesNiculae, Danut January 2015 (has links)
Over the years, packed malware have started to appear at a more rapid pace.Hackers are modifying the source code of popular packers to create new typesof compressors which can fool the Anti Virus software. Due to the sheer vol-ume of packer variations, creating unpacking scripts based on the packer’ssignature has become a tedious task. In this paper we will analyse genericunpacking techniques and apply them on ten popular compression software.The techniques prove to be successful in nine out of ten cases, providing aneasy and accessible way to unpack the provided samples
|
2 |
The Influence of Organizational Demographics and Whistleblowing Factors on Employee Perceptions of Procedural JusticeExmeyer, Patrick Clark 06 May 2017 (has links)
This dissertation seeks to advance the base of both whistleblowing and procedural justice literature. Building upon previous whistleblowing and procedural justice literature is accomplished through analysis of how organizational, demographic, and legislative factors contributing to whistleblowing shape employee perceptions of procedural justice. The act of whistleblowing has garnered considerable attention over the course of the past several decades. Employee disclosures of organizational wrongdoing have shaped influential research focusing on the characteristics of whistleblowers, organizational conditions contributing to whistleblowing, the motivations and intentions of whistleblowers, as well as both the personal and professional consequences of employees engaging in whistleblowing. These literary advancements have contributed to a robust base of scholarly knowledge concerning whistleblowing. However, previous research has neglected employee perceptions of procedural justice as it relates to the processing of whistleblowing disclosures. Utilizing data derived from regulatory agency employee responses to the Federal Employee Viewpoint Survey, along with Office of Special Counsel Annual Reports to Congress, this research aims to fill a literary gap concerning both whistleblowing and procedural justice research. This research examines the role of organizational, demographic, and legislative factors as they influence employee perceptions of procedural justice within a whistleblowing context. The findings of this research suggest that while the annual proportion of whistleblower disclosures substantiated by agency review and the introduction of federal whistleblower legislation does not correlate with increased employee perceptions of procedural justice, organizational demographics such as supervisory status and employee intention to remain with their respective agency consistently contribute to higher annual perceptions of procedural justice.
|
3 |
Triumph of the WhistleblowerWeintraub, Kathryn Elizabeth January 2012 (has links)
Thesis advisor: Donald Fishman / The whistleblower has emerged as a relevant player in today's shifting economic and corporate landscape. Using a critical-historical methodology, this thesis explores the dimensions and boundaries of the concept of the âwhistleblowerâ. The specific case studies of WorldCom, the Madoff Ponzi scheme, and WikiLeaks are examined. The analysis includes an investigation into the shifting role of the whistleblower in society and whether legislative enactments have been able to support societyâs need to protect current and future whistleblowers. Finally, this thesis examines the whistleblower's implications for a more ethical future. / Thesis (BA) — Boston College, 2012. / Submitted to: Boston College. College of Arts and Sciences. / Discipline: College Honors Program. / Discipline: Communication Honors Program. / Discipline: Communication.
|
4 |
On the Resistance of RSA Countermeasures at Algorithmic, Arithmetic and Hardware Levels Against Chosen-Message, Correlation and Single-Execution Side-Channel Attacks / Sur la résistance de contre-mesures RSA aux niveaux algorithmique, l'arithmétique et de matériel contre les attaques par canaux cachées par message choisi, de corrélation et de simple exécutionPerin, Guilherme 28 May 2014 (has links)
De nos jours, les concepteurs de dispositifs cryptographiques doivent non seulement mettre en œuvre des algorithmes robustes, mais ils doivent également s'assurer qu'il n'y ait pas de fuites d'informations à travers plusieurs canaux latéraux lors de l'exécution d'un algorithme. En effet, si ce n'est pas le cas, les implémentations cryptographiques, tant symétriques qu'asymétriques, seront vulnérables aux attaques par canaux auxiliaires. Pour les algorithmes à clé publique tels que le RSA, l'opération principale que doit être rendue robuste est l'exponentiation modulaire sur un anneau fini. Les principales solutions (contremesures) permettant de rendre robuste l'exponentiation modulaire à ces attaques par canaux auxiliaires sont basées sur la randomisation des données traitées. La randomisation de l'exposant et celle des messages sont en effet des techniques particulièrement efficaces pour contrecarrer les attaques par collision et par analyse des corrélations verticales. Toutefois, ces solutions éculées montrent leurs limites par rapport aux attaques dites horizontales qui n'exploitent qu'une exponentiation. Dans ce contexte, ce document relate le travail de conception, tant matériel que logiciel, d'un chiffreur RSA basé sur les systèmes modulaires de représentation des nombres (RNS). Ce chiffreur incorpore différentes contremesures définies à divers niveaux d'abstraction. L'évaluation de sa robustesse aux attaques par canaux cachés tant horizontales que verticales a démontré sa pertinence. / Not only designers of cryptographic devices have to implement the algorithmsefficiently, they also have to ensure that sensible information that leaks throughseveral side-channels (time, temperature, power consumption, electromagneticemanations, etc.) during the execution of an algorithm, remains unexploitedby an attacker. If not sufficiently protected, both symmetric and asymmetriccryptographic implementations are vulnerable to these so-called side-channelattacks (SCA). For public-key algorithms such as RSA, the main operation to bearmoured consists of a multi-digit exponentiation over a finite ring.Countermeasures to defeat most of side-channel attacks onexponentiations are based on randomization of processed data. The exponentand the message blinding are particular techniques to thwartsimple, collisions, differential and correlation analyses. Attacks based ona single (trace) execution of exponentiations, like horizontal correlationanalysis and profiled template attacks, have shown to be efficient againstmost of popular countermeasures.This work proposes a hardware and software implementations of RSA based on Residue Number System (RNS). Different countermeasures are implemented on different abstraction levels. Then, chosen-message and correlation attacks, based on both multi-trace and single-trace attacks are applied to evaluate the robustness of adopted countermeasures. Finally, we propose an improved single-execution attack based on unsupervised learning and multi-resolution analysis using the wavelet transform.
|
5 |
Conception, fabrication et caractérisation de dispositifs innovants de protection contre les décharges électrostatiques en technologie FDSOI / Design, fabrication and characterization of innovative ESD protection devices for 28 nm and 14 nm FDSOI technologiesSolaro, Yohann 11 December 2014 (has links)
L’architecture FDSOI (silicium sur isolant totalement déserté) permet une amélioration significative du comportement électrostatique des transistors MOSFETs pour les technologies avancées et est employée industriellement à partir du noeud 28 nm.L’implémentation de protections contre les décharges électrostatiques (ESD pour« Electro Static Discharge ») dans ces technologies reste un défi. Alors que l’approche standard repose sur l’hybridation du substrat SOI (gravure de l’oxyde enterré : BOX)permettant de fabriquer des dispositifs de puissance verticaux, nous nous intéressons ici à des structures dans lesquelles la conduction s’effectue latéralement, dans le film de silicium. Dans ces travaux, des approches alternatives utilisant des dispositifs innovants(Z²-FET et BBC-T) sont proposées. Leurs caractéristiques statiques, quasi-statiques et transitoires sont étudiées, par le biais de simulations TCAD et de caractérisations électriques. / FDSOI architecture (Fully Depleted Silicon On Insulator) allows a significantimprovement of the electrostatic behavior of the MOSFETs transistors for the advancedtechnologies. It is industrially employed from the 28 nm node. However, theimplementation of ESD (Electrostatic Discharges) protections in these technologies isstill a challenge. While the standard approach relies on SOI substrate hybridization (byetching the BOX (buried oxide)), allowing to fabricate vertical power devices, we focushere on structures where the current flows laterally, in the silicon film. In this work,alternative approaches using innovative devices (Z²-FET and BBC-T) are proposed. Theirstatic, quasi-static and transient characteristics are studied in detail, with TCADsimulations and electrical characterizations.
|
6 |
Mécanismes d'injection de porteurs minoritaires dans les circuits intégrés de puissance et structures de protections associéesLAINE, Jean Philippe 15 December 2003 (has links) (PDF)
Les travaux de recherche présentés dans ce mémoire s'inscrivent dans le contexte du problème d'isolation par jonction dans les circuits intégrés de puissance. Certains modes de fonctionnement du bloc de puissance induisent une injection conséquente de courant parasite dans le substrat. La plus contraignante est l'injection de porteurs minoritaires. Nous en détaillons l'origine ainsi que ses conséquences dangereuses sur les circuits intégrés. Nous présentons les solutions de protection existantes destinées à réduire ce courant parasite. Avec la réduction des dimensions des nouvelles technologies, ces solutions de protection ne sont plus adaptées en raison de leur dimension. Nous proposons donc une méthodologie de conception basée sur la simulation physique 3D et la simulation électrique pour créer ou adapter des structures de protections selon la filière technologique utilisée. Avant de les développer, nous proposons d'étudier les mécanismes d'injection de ces porteurs minoritaires selon la nature du substrat utilisé. Ainsi, dans un substrat P+, des techniques de protection simples, c'est-à-dire les protections passives par anneaux de garde, peuvent réduire considérablement le courant parasite. Dans un substrat P-, des techniques de protection plus complexes doivent être développées. Nous avons proposé des structures de protections actives. Son efficacité contre le courant parasite est validée par la caractérisation de structures de test spécifiques. Une solution de protection intégrée dans le composant de puissance améliorant également la robustesse vis-à-vis des décharges électrostatiques, a été validée sur silicium et a fait l'objet d'un brevet.
|
7 |
Methodologie de conception des protections des circuits intégrés contre les décharges électostatiquesNolhier, Nicolas 30 November 2005 (has links) (PDF)
La problématique des agressions par décharges électrostatiques (ESD) est un facteur critique dans la fiabilité des circuits intégrés. Ce document effectue la synthèse des travaux menés au LAAS-CNRS dans ce domaine. Les points suivants seront plus particulièrement abordés : - L'étude des mécanismes physiques qui gèrent le comportement d'un composant lors d'une décharge ESD - La mise en place d'une méthodologie de conception de structures de protection - Son application au développement de solutions de protection innovantes La dernière partie de ce document propose les perspectives de cet axe de recherche qui sont principalement motivés par les progrès technologiques des circuits intégrés, l'évolution des normes de robustesse et l'extension de nos travaux au niveau du système.
|
8 |
Vztah známkoprávní a autorskoprávní ochrany / The relationship between trademark protection and copyright protectionCrháková, Blanka January 2019 (has links)
RESUMÉ
The name of the thesis: The relationship between trademark protection and copyright protection This diploma thesis deals in a complex way with the system of relationship between trademark protection and copyright protection within Czech law. The diploma thesis is based mainly on two acts - Act No. 121/2000 Coll., On copyright protection, and Act No. 441/2003 Coll., On trademark protection. It also reflects European law including actual case-law. The main goal of the thesis is to show how both protections work, their mutual relation, eventually how and in which situations their convergence happens and what can be the consequences of it from the protection point of view. In the first chapter of my thesis we find introduction that brings the subject to the topic, including aim of the thesis. After that comes seven main chapters and a final conclusion. Initially in chapter two and three of my thesis, I define the basic concepts dealing with Intellectual property and law related to intangible property. Subsequently description of the simultaneous operation of both protections is discussed and based on that their similarities and differences are highlighted. The focus is on analysis of both protections, subjects of both protections, their beneficiaries, formation, duration, means and international...
|
9 |
A reinvenção da existência: histórias de vidas e o confronto da proteção e desproteção social na realidade de Manaus/AM / The reinvention of existence: life stories and the confrontation between social protection and helplessness in the reality of Manaus, AMSouza, Joselene Gomes de 23 November 2012 (has links)
Made available in DSpace on 2016-04-29T14:16:18Z (GMT). No. of bitstreams: 1
Joselene Gomes de Souza.pdf: 1014624 bytes, checksum: 7d1c5732ee193886109db5ae56bbb8d6 (MD5)
Previous issue date: 2012-11-23 / Fundação Ford / This work is the result of qualitative research, based in oral histories and the
understanding of the Brazilian social-historical context, its complexities and contrasts
in the social relationships observed in daily practices of resistance to domination. The
research aims at coming to an understanding of the subjects versions of the time
periods and facts related to the Brazilian social protections during the 20th century,
especially since the 1970 s. The work seeks to construct a trajectory starting with oral
histories, with life narratives, mediated by memory and subjectivity, based on the life
experiences of two women born in the city of Manaus in different decades. It
presents a study that is detached from institutional discourse while at the same time
values the memory, speech, individuality and subjectivity of real subjects and their
forms of daily resistance, with the intention of contributing to the comprehension of
the daily lives of children and adolescents in Brazil and the importance of social
protections, particularly in Manaus, AM, which by nature finds itself mired in a political
game, as well as reflecting on the Brazilian social protection system. It can be seen
that a scenario permeated by social injustices which have constructed the history of
thousands of people who struggle to validate equitable access to social protections.
The study reveals the inefficiency of the State and the segmentation imposed by a
capitalist society, mediated by the exclusion of access to goods and services, which
constitute the challenges to making the Brazilian system of social protection, even
when faced with recent advances / O presente trabalho é resultado de uma pesquisa qualitativa, que se apoia na
história oral e na compreensão do contexto sócio-histórico brasileiro, suas
complexidades e contrastes nas relações sociais observadas nas práticas cotidianas
de resistência a dominação. Objetivou-se conhecer a versão dos sujeitos sobre
períodos e fatos, que estão relacionados com a Proteção Social brasileira, durante o
século XX, especialmente a partir da década de 1970. Buscou-se construir uma
trajetória a partir da história oral, com narrativa de vida, mediada pela memória e
pela subjetividade, tendo como base a realidade vivenciada por duas mulheres
nascidas, em décadas diferentes, na cidade de Manaus. Apresentou-se um estudo
desvinculado do discurso institucional, ao mesmo tempo em que foram valorizadas a
memória, a fala, a individualidade e as subjetividades de sujeitos reais e suas formas
de resistência cotidiana, com vistas à contribuição para o entendimento da condição
da criança e do adolescente no Brasil e da importância da proteção social,
especialmente em Manaus/AM, que caracteristicamente vivencia um processo de
jogo político, assim como para importante reflexão sobre o sistema de proteção
social brasileiro. Haja vista que se apresentou um cenário permeado de injustiças
sociais, que constrói a história de milhares de pessoas, que lutam para validar o
acesso à proteção social, com equidade. Revelou-se a inoperância do Estado e a
segmentação imposta pela sociedade capitalista, mediante a exclusão do acesso a
bens e serviços, constituindo-se como desafios para a efetivação do sistema de
proteção social brasileiro frente aos seus recentes avanços
|
10 |
Tax Expenditures In The European Union And TurkeyCoskun, Zeynep 01 May 2010 (has links) (PDF)
This thesis analyzes the tax incentives and protection measures in the European Union and Turkey. The definition and classification of these measures in the form of tax expenditures will be stated in this study. EU&rsquo / s tax provisions in sources of the Acquis Communautaire will be described followed by the practice in the EU&rsquo / s major policy fields. The legal background and major policy implications of these tax policy measures in the framework of Turkey&rsquo / s tax laws will be explained followed by an evaluation of to what extent Turkey&rsquo / s tax expenditures are harmonized to the EU.
|
Page generated in 0.076 seconds