101 |
Reverse engineering of a malware eyeing the future of securityBurji, Supreeth Jagadish. January 2009 (has links)
Thesis (M.S.)--University of Akron, Dept. of Computer Science, 2009. / "August, 2009." Title from electronic thesis title page (viewed 11/11/2009) Advisor, Kathy J. Liszka; Faculty Readers, Timothy W. O'Neil, Wolfgang Pelz; Department Chair, Chien-Chung Chan; Dean of the College, Chand Midha; Dean of the Graduate School, George R. Newkome. Includes bibliographical references.
|
102 |
Integration of a Standard-Based Quality Assessment into the VizzAnalyzerRuiz de Azua, David January 2006 (has links)
More than half of the total costs in ownership of a software system are maintenance costs. Reverse engineering is becoming more important and complex for huge systems, and tools for reverse engineering are necessary for system evaluation. The ISO/IEC 9126 standard defines software quality and The VizzAnalyzer Framework is a stand-alone tool for analyzing and visualizing large software systems’ structures. In this thesis, we describe the design and implementation of plug-ins for the VizzAnalyzer Framework, a system for reverse engineering, extending their features under the standards of software quality. It has proven to be useful in applying the new features into the VizzAnalyzer Framework being the first tool that includes a software quality model.
|
103 |
Reverse Engineering of Corinthian Pigment Processing and Firing Technologies on Archaic Polychrome CeramicsKlesner, Catherine Elizabeth, Klesner, Catherine Elizabeth January 2017 (has links)
Decorative, polychrome ceramics from Corinth, Greece, produced during the 8th-6th centuries B.C.E. are luxury goods that were widely traded throughout Greece and the Mediterranean. The decorated ceramics were produced in a variety of shapes, including aryballos, alabastron, and olpe. They were decorated with slip-glazes in distinctive white, black, red, yellow, and purple colors, and in a variety of surface finishes, matte, semi-matte and glossy. Artisans in Corinthian workshops experimented to change the colors of the slips by varying the type and amount of iron-rich raw materials. They also varied the composition of the clay used as a binder and the amount of flux used as a sintering aid to promote glass formation. This research reconstructs the technology used by the Corinthian craftsmen to produce the Archaic polychrome ceramics, and shows how these technologies differed from the production of better known, more prestigious Athenian black-figure and red-figure ceramics. Through microstructural examination of archaeological samples and replication experiments, this thesis proposes that the purple iron oxide pigment is the result of acid treatment and oxidation of iron metal. The firing temperature range of the Corinthian polychrome ceramics was determined experimentally to be 925-1025° C, which is higher than previously reported and similar to that reported for Corinthian transport amphoras. The firing range is higher by 50-150° C than the Athenian black-figure and red-figure ceramics. Samples of Corinthian polychrome and Athenian black-figure ceramics from the Marie Farnsworth collection at the University of Arizona were tested and compared to Corinthian clay collections. Analytical techniques included Fourier-transform infrared spectroscopy (FTIR), scanning-electron microscopy with energy-dispersive spectroscopy (SEM-EDS), micro-Raman spectroscopy, and wavelength-dispersive electron microprobe (EPMA with BSE-SEM).
|
104 |
Reverse Engineering : En jämförelse mellan företag och forskareGrahn, Pernilla January 2004 (has links)
Användning av mjukvaruverktyg när reverse engineering utförs är ett måste för att få ett användbart resultat enligt Hainaut (2002). Kudrass m fl (1997) visar på brister som kan uppstå när mjukvaruverktyg används. Gemensamt för de forskare som har studerats i detta arbete är att de hävdar att företag saknar kunskap för att utföra reverse engineering med mjukvaruverktyg. Har forskarna rätt i att det saknas kunskap eller har företagen mer kunskap än vad forskarna tror? Då dessa forskare har en klar koppling till tillverkning av mjukvaruverktyg så är eventuellt inte deras påstående opartiska och därför är det intressant att se om deras påstående stämmer med verkligheten. För att undersöka hur mycket kunskap olika företag har om utförande av reverse engineering har intervjuer utförts för att få fram information som sedan jämfördes med forskarnas påstående. Av de företag som deltog i denna undersökning blev resultatet att forskarnas påstående inte kunde styrkas, det finns ingen kunskapsbrist på svenska företag idag inom reverse engineering. Och den naturliga kopplingen mellan mjukvaruverktyg och reverse engineering är mer framtvingad av leverantörer än naturlig för företagen, enligt några av de företag som deltog. Eftersom detta arbete är begränsat i tid så kan inte resultatet som har framkommit ses som att forskarna har rätt eller fel utan bara visa en liten del av vad företagen har för kunskap inom reverse engineering.
|
105 |
Methodologies to Exploit ATPG Tools for De-camouflagingVontela, Deepak Reddy 26 October 2016 (has links)
Semiconductor supply chain is increasingly getting exposed to Reverse Engineering (RE) of Intellectual Property (IP). Camouflaging of gates in integrated circuits are typically employed to hide the gate functionality to prevent reverse engineering. The functionalities of these gates cannot be found by De-layering as they don’t leave any layout clues. Adversaries perform reverse engineering by replacing the camouflaged gate with the known gate and by developing custom software to determine test patterns. These test patterns are used to analyze the outputs and to conclude the functionality of the camouflaged gate.
In this thesis, we show that reverse engineering of camouflaged design can be performed by exploiting the test features of commercial/publicly available Automatic Test Pattern Generation (ATPG) tools. We also propose controllability/observability and Hamming Distance sensitivity based metric to select target gates for camouflaging. Simulations on ISCAS85 benchmarks shows that the proposed techniques can increase the reverse engineering effort significantly by camouflaging small fraction of gates.
|
106 |
Digitalizace trupu ultralehkého letounu pro technologii výroby přesných forem / Digitalization of ultra-light plane fuselage for production of accurate mouldVéle, Filip January 2009 (has links)
This work describes digitalization and creation of ultralight aircraft 3D model in order to create accurate moulds for fuselage lamination. Right choice of technology is based on background research. Designed procedures are described in detail as well as used equipment, hardware and software. Objective of this project is application of available methods of digitalization to create 3D aircraft model and its usage for accurate mould design.
|
107 |
Automatically Inferring Image Bases of ARM32 BinariesChong, Daniel T. 26 May 2022 (has links)
No description available.
|
108 |
Multi-Dimensional Identification of Vulnerable Access Control in Mobile ApplicationsChaoshun, Zuo January 2020 (has links)
No description available.
|
109 |
A Novel Attack Method Against Split Manufactured CircuitsLiu, Rongrong January 2019 (has links)
No description available.
|
110 |
Classification of Malware using Reverse Engineering and Data Mining TechniquesRavula, Ravindar Reddy 15 August 2011 (has links)
No description available.
|
Page generated in 0.1113 seconds