361 |
Μοντελοποίηση εφαρμογών παγκόσμιου ιστού: αποδοτική αναζήτηση και εφαρμογή σχεδιαστικών λύσεων και προτύπων / Modelling web applications: efficient mining and application of design solutions and patternsΚατσίμπα, Θεοδώρα 16 May 2007 (has links)
Οι εφαρμογές παγκόσμιου ιστού προσφέρουν ολοένα και περισσότερες, με υψηλό βαθμό πολυπλοκότητας υπηρεσίες, σε σχέση με τους πρώτους ιστότοπους που χρησιμοποιούνταν απλά και μόνο για την προβολή πληροφοριών. Λόγω της ολοένα αυξανόμενης πολυπλοκότητας των εφαρμογών αυτών, ο σχεδιασμός, η ανάπτυξη κι η συντηρησιμότητα μιας εφαρμογής παγκόσμιου ιστού προβάλλει ως μία από τις μεγαλύτερες προκλήσεις που καλείται να αντιμετωπίσει ο σχεδιαστής της. Η ερευνητική κοινότητα προκειμένου να αντιμετωπίσει την αυξανόμενη πολυπλοκότητα του σχεδιασμού εφαρμογών παγκόσμιου ιστού έχει προτείνει ένα πλήθος προσεγγίσεων και μεθόδων βασισμένων σε μοντέλα. Η δουλειά του σχεδιαστή εφαρμογών παγκόσμιου ιστού μπορεί να απλοποιηθεί ακόμα περισσότερο με την επαναχρησιμοποίηση της εμπειρίας άλλων σχεδιαστών εφαρμογών παγκόσμιου ιστού. Η επαναχρησιμοποίηση της εμπειρίας αυτής γίνεται με χρήση σχεδιαστικών προτύπων που ορίζονται από πεπειραμένους σχεδιαστές. Αν κατά το σχεδιασμό μιας εφαρμογής χρησιμοποιηθεί κάποια μέθοδος μοντελοποίησης σε συνδυασμό με ένα σύνολο σχεδιαστικών προτύπων, η τελική εφαρμογή θα είναι πιο αποδοτική και ποιοτική. Πολλές φορές όμως, κατά το σχεδιασμό και την ανάπτυξη μιας εφαρμογής παγκόσμιου ιστού δε λαμβάνεται υπόψη κάποια συγκεκριμένη μεθοδολογία μοντελοποίησης και ανάπτυξης. Ένα πλήθος μεθόδων αντίστροφης μηχανίκευσης έχει αναπτυχθεί για την ανάλυση, κατανόηση και μοντελοποίηση των αρχιτεκτονικών τέτοιου είδους εφαρμογών. Στα πλαίσια της παρούσας διπλωματικής εργασίας μελετούνται οι μέθοδοι μοντελοποίησης που έχουν προταθεί από την ερευνητική κοινότητα, τα σχεδιαστικά πρότυπα που έχουν οριστεί καθώς και οι μέθοδοι και οι διαδικασίες αντίστροφης μηχανίκευσης που έχουν αναπτυχθεί. Επιπλέον προτείνεται μία μέθοδος αυτόματου εντοπισμού σχεδιαστικών λύσεων στο εννοιολογικό μοντέλο μιας εφαρμογής και μία μέθοδος αντίστροφης μηχανίκευσης με στόχο τη μοντελοποίηση της εφαρμογής. Αναλυτικά, η παρούσα διπλωματική εργασία είναι δομημένη ως εξής: Στο πρώτο κεφάλαιο παραθέτονται τα οφέλη χρήσης μοντέλων κατά το σχεδιασμό εφαρμογών παγκόσμιου ιστού, καθώς και οι βασικές απαιτήσεις που θα πρέπει να ικανοποιούν οι μέθοδοι μοντελοποίησης για την πληρέστερη μοντελοποίηση των χαρακτηριστικών των εφαρμογών παγκόσμιου ιστού. Επιπλέον, γίνεται επισκόπηση και παρουσίαση των κυριότερων μεθόδων μοντελοποίησης που έχουν προταθεί από την ερευνητική κοινότητα. Ιδιαίτερη βαρύτητα δίνεται στην παρουσίαση της γλώσσας μοντελοποίησης WebML, γιατί αποτελεί την γλώσσα μοντελοποίησης με βάση την οποία αναπτύχθηκαν οι μέθοδοι που προτείνονται στα κεφάλαια 3 και 4. Τέλος, στο κεφάλαιο αυτό γίνεται σύγκριση των προτεινόμενων μεθόδων μοντελοποίησης. Στο δεύτερο κεφάλαιο παρουσιάζονται τα οφέλη χρήσης σχεδιαστικών προτύπων τόσο από άπειρους όσο και από έμπειρους σχεδιαστές και δίνεται ένας επίσημος ορισμός των σχεδιαστικών προτύπων για τον παγκόσμιο ιστό. Επιπλέον, στα πλαίσια του κεφαλαίου αυτού γίνεται παρουσίαση των προτύπων δημοσίευσης και διαχείρισης περιεχομένου που έχουν οριστεί στη WebML. Για το σχεδιασμό πολύπλοκων εφαρμογών παγκόσμιου ιστού, ναι μεν το είδος επαναχρησιμοποίησης που προσφέρουν τα σχεδιαστικά πρότυπα παγκόσμιου ιστού είναι πολύτιμα, εν τούτοις απαιτείται η επαναχρησιμοποίηση όσο το δυνατόν μεγαλύτερων σχεδιαστικών δομών. Για το λόγο αυτό γίνεται αναφορά και παρουσίαση της επαναχρησιμοποίησης που υποστηρίζεται από τη χρήση σχεδιαστικών πλαισίων ανάπτυξης εφαρμογών παγκόσμιου ιστού. Στο τρίτο κεφάλαιο προτείνεται μία μέθοδος ανάκτησης αποδοτικών σχεδιαστικών λύσεων και σχεδιαστικών προτύπων μέσα στο εννοιολογικό σχήμα-μοντέλο μίας ή περισσότερων εφαρμογών παγκόσμιου ιστού. Η συγκεκριμένη μεθοδολογική προσέγγιση, αν εφαρμοστεί σε εννοιολογικά σχήματα πολλών εφαρμογών μίας συγκεκριμένης κατηγορίας, μπορεί να οδηγήσει στον προσδιορισμό πλαισίων ανάπτυξης εφαρμογών για τον αποδοτικό σχεδιασμό εφαρμογών της συγκεκριμένης αυτής κατηγορίας, ή ακόμα και στον αυτόματο εντοπισμό σχεδιαστικών προτύπων. Τέλος, στο τέταρτο κεφάλαιο παρουσιάζονται ο ερευνητικός χώρος της αντίστροφης μηχανίκευσης, τα συστατικά που αποτελούν μία εφαρμογή παγκόσμιου ιστού, καθώς και ο τύπος της πληροφορίας που απαιτείται να εξαχθεί από μία διαδικασία αντίστροφης μηχανίκευσης, έτσι ώστε να γίνει κατανοητή και αντιληπτή η αρχιτεκτονική μιας τέτοιας εφαρμογής. Προτείνεται επίσης μια μέθοδος αντίστροφης μηχανίκευσης εφαρμογών παγκόσμιου ιστού, με στόχο τη μοντελοποίησή τους με χρήση της WebML και παρουσιάζεται το εργαλείο που αναπτύχθηκε στα πλαίσια της διπλωματικής εργασίας, για να υποστηρίξει την προτεινόμενη μέθοδο. Η εφαρμογή του σε μία εφαρμογή προβολής περιεχομένου έδωσε ενθαρρυντικά αποτελέσματα όσον αφορά τη λειτουργικότητα και την αποτελεσματικότητα της μεθόδου. / Web Applications provide many services and they are not used just to display content, as it was the case for the first web sites. Due to the growing complexity, the design, development and maintenance of these aplications has become one of the major challenges that the developer has to face. In an attempt to face this growing complexity, the research community has proposed a number of model based approaches and methods. The task of the hypertext architect may be further facilitated by reusing the experience of other hypertext architects. This reuse is achieved by means of design patterns that have been defined by experts. If, we make use of a modelling method in combination with design patterns when designing a web application, the final result will be more efficient and qualitative. Usually, due to the pressing market demands, the modeling methods or techniques are not applied during the degin and development of the web applications. A number of reverse engineering methods and tools have been proposed in order to analyse, comprehend and model the architectures of such applications. In this thesis, we study the various modelling methods that have been proposed, as well as the design paterns that have been defined and the reverse engineering methods that have been developed. Furthermore, we propose a method to automatically detect design solutions at the conceptual schema of a web application and a reverse engineering method in order to model an existing web application. Analytically, this master thesis is being structured in the following chapters: The first chapter presents the benefits of using models when designing web applications, as well as the requirements that a web application must satisfy in order to be able to model the features of the web applications. The main modelling methods, that have been proposed by the research community, are also presented. The Web modelling language (WebML) is extensively presented as it constitutes the model language with which the methods that we suggest in chapters 3 and 4 have been developed. In the end of this chapter, we make a comparison of the proposed modelling methods. In the second chapter we present the benefits gained when using design patterns by non-experienced as well by experienced developers. Moreover, we present the patterns that have been defined in WebML. Though the kind of reuse provided by patterns is valuable when designing web applications, complex web applications need a way to maximize reuse of larger design structures. For this reason, we also present the kind of reuse that is provided by using web application frameworks. In the third chapter we propose a methodology for retrieving effective design solutions, or even more design patterns, within the conceptual schema of one or more web applications. This approach, if applied to a large number of applications of the same domain, may lead to the identification of templates for specific domain Web application frameworks and to the discovery of new design patterns. The fourth and last chapter of this thesis focuses on reverse engineering. We present the work that has been done in the domain of reverse engineering, the components of a web application, and the type of information that should be retrieved by a reverse engineering approach in order to comprehend the architecture of the web application. We also suggest a reverse engineering method in order to model an existing web application using WebML. The tool that was implemented in order to support this method is also presented. Applying this method in a content management application gave us good results as far as its functionality and its effectiveness are concerned.
|
362 |
Rekonstrukcijos metodų analizė modernizuojant informacinę sistemą / Analysis of software re-engineering methods for modernization of information systemMalinauskienė, Eglė 27 May 2004 (has links)
This master thesis covers re-engineering methods of legacy systems. Legacy system is an old system, which is hardly compliant with modern technologies and used only because it has become an integral part of organization business process support during the long period of its maintenance. These systems are large, monolithic and difficult to modify, and cost and risk of their replacement are difficult to predict. The science of software engineering offers an incremental modernization of information systems applying the re-engineering of legacy software. The main goal of software re-engineering is to transform the software in the way, it would become easier to understand, maintain and re-use, at the same time preserving its useful, time trusted functions. The main re-engineering methods are source code translation, reverse engineering and data re-engineering. This thesis covers the analysis of these methods, which was made during the re-engineering of wood production and sales accounting system. The adoption and realization time rate of every method was examined. The influence of the applied re-engineering methods to the system reliability, efficiency, usability and other quality metrics is given.
|
363 |
Dérivation de diagrammes de séquence UML compactes à partir de traces d’exécution en se basant des heuristiquesAloulou, Houssem 07 1900 (has links)
No description available.
|
364 |
Functional and Security Testing of a Mobile Client-Server Application / Funktionell och säkerhetstestning av en mobilapplikation bestående av en klient- och serversidaHolmberg, Daniel, Nyberg, Victor January 2018 (has links)
Today’s massive usage of smartphones has put a high demand on all application developers in the matter of security. For us to be able to keep using all existing and new applications, a process that removes significant security vulnerabilities is essential. To remove these vulnerabilities, the applications have to be tested. In this thesis, we identify six methods for functional and security testing of client-server applications running Android and Python Flask. Regarding functional testing, we implement Espresso testing and RESTful API testing. In regards to the security testing of the system, we do not only implement fuzz testing, sniffing, reverse engineering and SQL injection testing on a system developed by a student group in a parallel project, but also discover a significant security vulnerability that directly affects the integrity and reliability of this system. Out of the six identified testing techniques, reverse engineering exposed the vulnerability. In conjunction with this, we verified that the system’s functionality works as it is supposed to.
|
365 |
Une méthodologie de Reverse Engineering à partir de données hétérogènes pour les pièces et assemblages mécaniques / A methodology of Reverse Engineering from heterogeneous data for parts and mechanical assembliesBruneau, Marina 22 March 2016 (has links)
Cette thèse traite d'une méthodologie de Reverse Engineering (RE) d'assemblages mécaniques à partir de données hétérogènes dans un contexte routinier. Cette activité consiste à partir d'un produit ou d'un assemblage, à récupérer la donnée numérique en partant de la donnée physique dans le but de reconstruire sa maquette numérique. Plusieurs techniques de numérisation peuvent être employées et permettent de générer des données de différents types (ex : nuage de points, photographies). Ces dernières sont utilisées comme données d'entrée à notre processus de RE et peuvent aussi être associées à des données liées au produit, existantes au préalable, telles que des mises en plan ou encore une version antérieure de la maquette numérique du produit. Le traitement de l'ensemble de ces données, dites "hétérogènes", requiert une solution qui soit capable de gérer d'une part, l'hétérogénéité des données et des informations qu'elles contiennent et d'autre part, l'incomplétude de certaines données qui est liée au bruit ou à la technologie utilisée pour numériser l'assemblage (ex : scanner ou photographie). Enfin la pertinence des informations extraites lors de la phase de traitement doit permettre, dans certains cas, de générer des modèles CAO paramétrés, propres à l'activité de RE de l'entreprise ou du domaine d'application. L'état de l'art sur la reconnaissance de formes dans des données hétérogènes ainsi que sur la gestion de connaissances dans le cadre d'activités routinières, propose des approches qui traitent soit d'un seul type de données, soit du RE de pièce unique ou soit elles ne permettent pas d'obtenir un modèle CAO qui soit exploitable (paramétrage géométrique des entités) pour une activité de RE. Cette thèse propose une méthodologie nommée Heterogeneous Data Integration for Reverse Engineering (HDI-RE) et qui se décompose en trois étapes : la segmentation, la signature et la comparaison avec une base de connaissances. Le but de cette méthode est d'automatiser le processus de RE et notamment en ce qui concerne les étapes de reconnaissance de composants dans les données d'entrée et d'aide à la reconstruction de modèles CAO (paramétrés ou non) en récupérant des informations géométriques et topologiques dans des données d'entrée. Pour cela, ces dernières sont segmentées afin d'en extraire des informations qui sont en suite formalisées sous la forme de signatures. Les signatures générées sont ensuite comparées à une base de connaissances comportant un ensemble de signatures de différents types et appartenant à des produits ou objets déjà connus. Le calcul des similarités issu de la comparaison permet d'identifier les composants présents dans les données en entrée. L'apport scientifique de ces travaux repose principalement sur l'utilisation de signatures qui, en fonction du souhait de l'utilisateur, permettent de reconstruire une maquette numérique en sortie du processus de RE avec trois niveaux d'information : un niveau global, un niveau géométrique et topologique ou un niveau fonctionnel. Par rapport à chaque niveau et du type de données traité, un mécanisme de signature dédié est proposé. / This thesis deals with a methodology of Reverse Engineering (RE) of mechanical assemblies from heterogeneous data in a routine context. This activity consists, from the existing data of a part or an assembly, in rebuilding their digital mock-up. The data used in entrance of our process of RE can be drawings, photos, points clouds or another existing version of the digital mock-up. The proposed approach, called Heterogeneous Data Integration for Reverse Engineering (HDI-RE), is divided into three steps : the segmentation, the signature and the comparison of the initial data with a knowledge database. The signatures of the studied object are compared with the signatures of the same type existing in the database in order to extract components ordered by similarity (distance with the object). The parameterized digital mock-up which is the most similar to the object is then extracted and its parameters identified from the initial data. Data set processing, called "heterogeneous" data, requires a solution which is able to manage on one hand, the heterogeneousness of the data and the information which they contain and on the other hand, the incompleteness of some data which are in link with the noise (into points cloud) or with the technology used to digitize the assembly (ex: scanner or photography).
|
366 |
CRISTA : um apoio computacional para atividades de inspeção e compreensão de códigoPorto, Daniel de Paula 18 May 2009 (has links)
Made available in DSpace on 2016-06-02T19:05:38Z (GMT). No. of bitstreams: 1
2434.pdf: 10415904 bytes, checksum: cf49390a38715c53ffe39e9881ed117c (MD5)
Previous issue date: 2009-05-18 / Financiadora de Estudos e Projetos / Software inspection is a key activity of software quality assurance that can be applied in the whole development process since it is a static activity essentially based on reading. Depending on the artifact that is being inspected, we need to apply the appropriated reading technique. Stepwise Abstraction (SA) is a reading technique commonly used in code inspections. However, its application is laborious and time consuming. Aiming to help and facilitate the application of SA, this work presents CRISTA (Code Reading Implemented with Stepwise Abstraction), a tool to support SA-based inspection processes. This tool uses a visual metaphor to facilitate code navigation and has several resources to help program understanding and documentation. Due to these resources, CRISTA is also helpful for reverse engineering, re-engineering and maintenance activities. Three experimental studies were carried out to get feedback on the tool usability and usefulness for inspections and maintenance activities. The results provide insights that CRISTA is easy to use and adequately supports the inspection process as well as code reading by Stepwise Abstraction. Besides, in the context of maintenance, its resources make this activity less time-consuming. / Inspeção de software é uma atividade chave de garantia de qualidade de software que pode ser aplicada durante todo o processo de desenvolvimento uma vez que é uma atividade estática, baseada essencialmente em técnica de leitura. Dependendo do artefato inspecionado, é preciso aplicar a técnica apropriada. No caso de inspeção de código uma técnica comumente utilizada é a Stepwise Abstraction (SA). No entanto, sua aplicação é trabalhosa e consome muito tempo. Com o objetivo de auxiliar e facilitar a aplicação da SA, este trabalho apresenta a CRISTA (Code Reading Implemented with Stepwise Abstraction), uma ferramenta que apóia o processo de inspeção baseado em SA. Essa ferramenta usa uma metáfora visual para facilitar a navegação pelo código e possui vários recursos que ajudam na compreensão do código e em sua documentação. Devido a esses recursos, a CRISTA também auxilia nas atividades de engenharia reversa, re-engenharia e manutenção. Foram realizados três estudos experimentais com o objetivo de se obter uma realimentação sobre a usabilidade e a utilidade da ferramenta em atividades de inspeção e manutenção. Os resultados fornecem evidências de que a CRISTA é fácil de ser utilizada e apóia adequadamente o processo de inspeção, bem como a leitura de código utilizando a Stepwise Abstraction. Além disso, no contexto de manutenção, os recursos da ferramenta ajudam a diminuir o tempo dessa atividade.
|
367 |
Abordagem RPN para a recuperação de processos de negócio baseada na análise estática do código fonteRabelo, Luiz Alexandre Pacini 02 September 2015 (has links)
Submitted by Izabel Franco (izabel-franco@ufscar.br) on 2016-10-03T18:14:47Z
No. of bitstreams: 1
DissLAPR.pdf: 4492395 bytes, checksum: 3cbeb71e7d3159ff9f8b260e4486c81d (MD5) / Approved for entry into archive by Marina Freitas (marinapf@ufscar.br) on 2016-10-20T19:18:44Z (GMT) No. of bitstreams: 1
DissLAPR.pdf: 4492395 bytes, checksum: 3cbeb71e7d3159ff9f8b260e4486c81d (MD5) / Approved for entry into archive by Marina Freitas (marinapf@ufscar.br) on 2016-10-20T19:18:51Z (GMT) No. of bitstreams: 1
DissLAPR.pdf: 4492395 bytes, checksum: 3cbeb71e7d3159ff9f8b260e4486c81d (MD5) / Made available in DSpace on 2016-10-20T19:18:57Z (GMT). No. of bitstreams: 1
DissLAPR.pdf: 4492395 bytes, checksum: 3cbeb71e7d3159ff9f8b260e4486c81d (MD5)
Previous issue date: 2015-09-02 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) / Over time, Business Processes have become a key asset for organizations since it allows
managing what happens within their environments. It is possible to automate some activities
of business processes resorting to the use of Information Systems and accordingly
decrease the execution time and increase the production. However, Information systems
often suffer maintenance over time and become obsolete in their technologies and a reengineering
process becomes necessary. In this case, the Business Knowledge, located more
accurately the reality in information system source code, should be mantained. Thereof, in
this work, we propose an Approach to support the Business Process Recovery from Source
Code. The approach, entitled RPN, uses a static analysis technique of source code because
it allows to analyze the source code without the need to modify and run the information
system source code. Furthermore, the approach uses the Knowledge Discovery Metamodel
(KDM) standard with a set of Heuristic rules to identify relevant code elements to the business
layer. As result, Business Process Models are generated according to Business Process
Model and Notation (BPMN) standard specification. This models, together with other software
artifacts, provide more subsidies to the Software Reengineering process. To evaluate
the proposed approach, a case study was performed in Academic Domain to measure the
effectiveness of the approach compared to the other approaches and the manual process.
The results exceeded expectations and prove that the approach is effective. / Ao longo do tempo, processos de negócio se tornaram um artefato chave para organizações,
visto que esses processos permitem gerenciar o que acontece dentro de seus ambientes.
É possível automatizar algumas atividades de processos de negócio recorrendo ao uso de
sistemas de informação e, dessa forma, diminuir o tempo de execução dessas atividades e
aumentar a produção. Entretanto, ao longo do tempo, sistemas de informação sofrem diversas
manutenções e tornam-se obsoletos em suas tecnologias e um processo de reengenharia
torna-se necessário. Nesse caso, o conhecimento do negócio, localizado mais precisamente
à realidade no código fonte do sistema de informação, deve ser mantido. Por este motivo,
este trabalho propõe uma abordagem para apoiar a recuperação de processos de negócio a
partir do código fonte. A abordagem, nomeada RPN, recorre à técnica de análise estática
do código fonte, uma vez que essa técnica permite analisar o código fonte de um sistema
sem a necessidade de modificá-lo e executá-lo. Além disso, a abordagem utiliza o padrão
Knowledge Discovery Metamodel (KDM) com um conjunto de regras de heurísticas para
recuperar elementos de código relevantes à camada de negócio. Como resultado, são gerados
modelos de processos de negócio de acordo com a especificação padrão Business
Process Model and Notation (BPMN). Esses modelos, em conjunto com outros artefatos de
software, fornecem maiores subsídios para o processo de reengenharia de software. Para
avaliar a abordagem proposta, foi realizado um estudo de caso no domínio acadêmico para
mensurar a eficácia da abordagem comparado às outras abordagens e ao processo manual.
Os resultados obtidos foram satisfatórios e a abordagem RPN mostrou-se muito eficaz e
eficiente para executar seu propósito.
|
368 |
UN FORMALISME UNIFIANT LES ATTAQUES PHYSIQUES SUR CIRCUITS CRYTOGRAPHIQUES ET SON EXPLOITATION AFIN DE COMPARER ET RECHERCHER DE NOUVELLES ATTAQUES / A FORMALISM FOR PHYSICAL ATTACKS ON CRYPTOGRAPHIC DEVICES AND ITS EXPLOITATION TO COMPARE AND RESEARCH NEWS ATTACKSLe Bouder, Hélène 24 October 2014 (has links)
Cette thèse se situe dans la cryptanalyse physique des algorithmes de chiffrement par blocs. Un algorithme cryptographique est conçu pour être mathématiquement robuste. Cependant, une fois implémenté dans un circuit, il est possible d'attaquer les failles de ce dernier. Par opposition à la cryptanalyse classique, on parle alors d'attaques physiques. Celles-ci ne permettent pas d'attaquer l'algorithme en soi, mais son implémentation matérielle. Il existe deux grandes familles d'attaques physiques différentes : les attaques par observation du circuit durant le chiffrement, et les attaques par injections de fautes, qui analysent l'effet d'une perturbation intentionnelle sur le fonctionnement du circuit. Les attaques physiques ont deux types d'objectifs : rechercher la clé ou faire de la rétro-conception (retrouver une partie d'un algorithme de chiffrement privé, ex : s-boxes modifiées). Bien que leurs principes semblent distincts, cette thèse présente un formalisme qui permet d'unifier toutes ces attaques. L'idée est de décrire les attaques physiques de façon similaire, afin de pouvoir les comparer. De plus, ce formalisme a permis de mettre en évidence de nouvelles attaques. Des travaux novateurs ayant pour objet de retrouver la clé de chiffrement d'un AES, uniquement avec la consommation de courant ont été menés. Une nouvelle attaque de type FIRE (Fault Injection for Reverse Engineering) pour retrouver les s-boxes d'un pseudo DES est également présentée dans la thèse. Ce travail a abouti sur une réflexion plus générale, sur les attaques par injections de fautes dans les schémas de Feistel classiques et généralisés. / The main subject of this work is the physical cryptanalysis of blocks ciphers. Even if cryptographic algorithms are properly designed mathematically, they may be vulnerable to physical attacks. Physical attacks are mainly divided in two families: the side channel attacks which are based on the observation of the circuit behaviour during the computation, and the fault injection attacks which consist in disturbing the computation in order to alter the correct progress of the algorithm. These attacks are used to target the cipher key or to reverse engineer the algorithm. A formalism is proposed in order to describe the two families in a unified way. Unifying the different attacks under a same formalism allows to deal with them with common mathematical tools. Additionally, it allows a comparison between different attacks. Using this framework, a generic method to assess the vulnerabilities of generalized Feistel networks to differential fault analysis is presented. This work is furthermore extended to improve a FIRE attack on DES-like cryptosystems with customized s-boxes.
|
369 |
Aplikace moderních technologií pro výrobu prototypové formy / Application of Modern Technologies to Production of Prototype FormPospíšil, Josef January 2017 (has links)
This Diploma Thesis deals with modern technologies such as 3D scanning, rapid prototyping and vacuum casting to production of prototype form. It considers advantages and disadvantages of the modern technologies compared to traditional process of manufacturing prototype form and economical contribution using the modern technologies. Part of the thesis considers a choice of suitable manufacturing technology of a particular product.
|
370 |
Výpočet sedání výškové budovy s využitím metody konečných prvků / Prediction of foundation settlement of high-rise building using the finite element methodČervenka, Jan January 2020 (has links)
The focus of this thesis is to deal with reverse engineering of high-rise building settlements. This is modeled via the finite element method performed in the Plaxis 3D program. In the first part of this thesis, a calibration of input parameters of an appropriate material model – Hardening soil – is conducted. This calibration is a result of oedometric test data which were obtained within a geotechnical survey. An influence of soils over consolidation affecting calibration and the material model choice is described. Final values of reference stiffness parameters are used in a mathematical model of the focused area. This model is created for one half of the high-rise building plan, including vestibule. The high-rise building is founded in a foundation pit. The foundations of this building consist of raft foundation and piles of jet grouting. In the model, there are also changes in pore pressure during an excavation of foundation pit included. The functional model is used for parametric analyses, namely examining cases of object´s foundations and the possible influence of foundation pit´s symmetry on the object´s settlement. All the calculated processes in the object´s settlements are then compared to data obtained from geotechnical monitoring of the structure.
|
Page generated in 0.1306 seconds