• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 189
  • 32
  • 30
  • 22
  • 16
  • 10
  • 9
  • 6
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 387
  • 387
  • 97
  • 92
  • 59
  • 55
  • 50
  • 45
  • 36
  • 34
  • 33
  • 33
  • 31
  • 29
  • 27
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
201

Reverse Engineering Behavioural Models by Filtering out Utilities from Execution Traces

Braun, Edna January 2013 (has links)
An important issue in software evolution is the time and effort needed to understand existing applications. Reverse engineering software to recover behavioural models is difficult and is complicated due to the lack of a standardized way of extracting and visualizing knowledge. In this thesis, we study a technique for automatically extracting static and dynamic data from software, filtering and analysing the data, and visualizing the behavioural model of a selected feature of a software application. We also investigate the usefulness of the generated diagrams as documentation for the software. We present a literature review of studies that have used static and dynamic data analysis for software comprehension. A set of criteria is created, and each approach, including this thesis’ technique, is compared using those criteria. We propose an approach to simplify lengthy traces by filtering out software components that are too low level to give a high-level picture of the selected feature. We use static information to identify and remove small and simple (or uncomplicated) software components from the trace. We define a utility method as any element of a program designed for the convenience of the designer and implementer and intended to be accessed from multiple places within a certain scope of the program. Utilityhood is defined as the extent to which a particular method can be considered a utility. Utilityhood is calculated using different combinations of selected dynamic and static variables. Methods with high utilityhood values are detected and removed iteratively. By eliminating utilities, we are left with a much smaller trace which is then visualized using the Use Case Map (UCM) notation. UCM is a scenario language used to specify and explain behaviour of complex systems. By doing so, we can identify the algorithm that generates a UCM closest to the mental model of the designers. Although when analysing our results we did not identify an algorithm that was best in all cases, there is a trend in that three of the best four algorithms (out of a total of eight algorithms investigated) used method complexity and method lines of code in their parameters. We also validated the algorithm results by doing a comparison with a list of methods given to us by the creators of the software and doing precision and recall calculations. Seven out of the eight participants agreed or strongly agreed that using UCM diagrams to visualize reduced traces is valid approach, with none who disagreed.
202

Reverzní inženýrství na platformách Java a Android / Reverse engineering of platforms Java and Android

Žák, Josef January 2016 (has links)
This thesis deals with reverse engineering of Android and Java. It contains a description of existing tools and techniques, including techniques of defense. The first part is focused on available research about the topic. The next part discusses usage of reverse engineering in software development. The next chapters describe Android operating system and concept of a virtual machine on both platforms. Both kinds of architectures are compared (register-based vs stack-based machine). Core of the work is focused on static analysis (content of APK file, disassembling, decompilation). Available decompilers of class and dex files are compared. Testing is made with various versions of Java. The final chapter contains techniques and tools of defense against reverse engineering including a description of pros and cons. Two popular obfuscators are tested (Proguard, DashO).
203

Development of a Layout-Level Hardware Obfuscation Tool to Counter Reverse Engineering

Malik, Shweta 17 July 2015 (has links)
Reverse engineering of hardware IP block is a common practice for competitive purposes in the semiconductor industry. What is done with the information gathered is the deciding legal factor. Once this information gets into the hands of an attacker, it can be used to manufacture exact clones of the hardware device. In an attempt to prevent the illegal copies of the IP block from flooding the market, layout-level obfuscation based on switchable dopant is suggested for the hardware design. This approach can be integrated into the design and manufacturing flow using an obfuscation tool (ObfusTool) to obfuscate the functionality of the IP core. The ObfusTool is developed in a way to be flexible and adapt to different standard cell libraries and designs. It enables easy and accurate evaluation of the area, power and delay v/s obfuscation trades-offs across different design approaches for hardware obfuscation. The ObfusTool is linked to an obfuscation standard cell library which is based on a prototype design created with Obfuscells and 4-input NAND gate. The Obfuscell is a standard cell which is created with switchable functionality based on the assigned dopant configurations. The Obfuscell is combined with other logic gates to form a standard cell library, which can replace any number of existing gates in the IP block without altering it's functionality. A total of 160 different gates are realized using permutated combinations starting with 26 unique gate functions. This design library provide a high level of obfuscation in terms of the number of combinations an adversary has to go through increase to 2 2000 approximately based on the design under consideration. The connectivity of the design has been ignored by previous approaches, which we have addressed in this thesis. The connectivity of a design leaks important information related to inputs and outputs of a gate. We extend the basic idea of dopant-based hardware obfuscation by introducing "dummy wires". The addition of dummy wires not only obfuscates the functionality of the design but also it's connectivity. This greatly reduces the information leakage and complexity of the design increases. To an attacker the whole design appears as one big 'blob'.This also curbs the attempts of brute force attacks. The introduced obfuscation comes at a cost of area and power overhead on an average 5x, which varies across different design libraries.
204

En undersökning om användandet av additiv tillverkning inom motorsport

Angerbjörn, eran1804 January 2021 (has links)
Utvecklingen av produkter inom motorsporten är viktig ur flera aspekter. Dels för att miljöaspekten kring motorsport är mer aktuell än någonsin och för att ny teknologi gör det möjligt att optimera fordonen mer. Den här rapporten handlar om att optimera ett insug till en specifik förbränningsmotor, Volvos motor B234 16v. Insuget modelleras i programmet SolidWorks, där en CAD-fil tas fram. Från denna CAD-modell ska insuget sedan konstrueras genom additiv tillverkning. Uppgiften var att optimera gasflödet och producera en produkt som är lättare än originalprodukten, i ett polymermaterial som klarar de temperatur och lösningsmedelskrav som ett insug till en förbränningsmotor kräver. Reverse engineering användes för att matcha de båda flänsarna på varsin sida om insuget mot motor och spjällhus. Ett antal olika versioner av insug modellerades och testades för optimalt gasflöde. Från detta valdes den bäst flödande versionen ut. En polymer, PA12 (polyamide) Nylon glasfilled, presenterades som det bäst tänkbara materialet för den additiva tillverkningen av insuget. Genom att använda det presenterade materialet kunde en viktminskning på 37% uppnås. Det färdiga insuget skall sedan testas i motorbänk av uppdragsgivaren för att jämföras med ett insug som modifierats efter Trendabs ursprungliga process. Efter arbetet kunde det konstateras att processen som använts i arbetet inte bara är sparar pengar åt uppdragsgivaren, men även sparar tid i form av arbete som kan lejas bort istället för att göras in-house. Det framgick även att reverse engineering kunde göras med goda resultat utan att använda avancerad skannerteknik. Istället kan konstruktören utgå ifrån den del som skall modifieras för att använda mått och bilder för skapandet av CAD-modellen / <p>Betyg 2021-07-16</p>
205

Systém pro detekci vzorů v binárních souborech / System for Pattern Recognition in Binary Files

Milkovič, Marek January 2017 (has links)
Malicious software spreads really fast in the age of the Internet and it harms users and their data. Therefore, it is necessary to improve methods of how we deal with its analysis, so we can protect potential victims. This thesis deals with design and implementation of system for generating patterns out of executable files in cooperation with AVG Technologies. The goal of this work is to create a tool that generates a detection pattern from the set of binary files. This work further proposes new types of analyses for extraction of information out of executable files. Designed and implemented system is used in practice for analysis of new malicious code and it is integrated into the clustering system.
206

Návrh replikované výroby zvolené součásti za využití technologie Reverse engineering a Rapid prototyping / Design of replicated production of the selected part using the technology Reverse Engineering and Rapid prototyping

Kolář, Jakub January 2019 (has links)
This study has been as a diploma project at BUT. Theoretical part describes the most used methods in Reverse engineering and Rapid Prototyping. Each method describes its characteristics, usability and pros and cons in general. Practical part of this study deals with application of these methods. Goal of this work has been to obtain a digital model of a winker from Škoda 1000 car using optical scanner ATOS, making a new master model in CATIA software, analyzing its dimensions compared to the scanned model and choosing a suitable manufacturing technology with emphasis on functional properties of this component.
207

Příprava vzorků pro tahovou zkoušku z tvarově složitého dílu s využitím technologií Reverse Engeneering a CAD/CAM systémů / Sample preparation for tensile test from a form-complex part using Reverse Engineering and CAD/CAM systems

Okřina, Lukáš January 2019 (has links)
The Master's thesis deals with the proposition of a suitable methodology to produce test specimens intended for tensile testing. Considering the irregular geometries of the parts and deformations in previous tests, reverse engineering was used to obtain a CAD model that was used to control dimensions and create a machining strategy. This thesis also includes an analysis of current technologies in the field of reverse engineering.
208

Zavedení metodiky měření pomocí technologie 3D skenování do strojírenské výroby / Introduction of measurement methodology using 3D scanning technology into mechanical production

Klein, Adam January 2020 (has links)
This thesis focuses on comparison of the commonly used method of tactile measurement with 3D scanning methods for their introduction into engineering production. The first part summarizes the current state with the description of measurement technologies with emphasis on 3D technologies and their versatile use. The second part presents a practical comparison of three types of measuring devices on a selected component of a bicycle. After numerical and graphical evaluation of the measurement results, these values are further statistically processed and the measurement uncertainties are calculated. The final part of the work evaluates the whole process and presents practical suggestions, options and recommendations.
209

Vylepšený sandboxing pro pokročilé kmeny malwaru / Enhanced Sandboxing for Advanced Malware Families

Sidor, Samuel January 2021 (has links)
This Master’s thesis describes reverse engineering with focus on malware analysis. Reader will be informed about theoretical description of static and dynamic analysis. These techniques are later used on analysis of 5 malware families with focus on detection of used anti-sandbox techniques. After that new theoretical improvements are proposed with detection of anti-sandbox techniques or fully avoiding such anti-sandbox evasion techniques. Finally these changes are implemented on main sandbox of Avast Software from which reader can see how effective these improvements are.
210

Aplikace moderních technologií pro návrh a výrobu prototypu lyžařské helmy / Application of modern technologies for design and production of a ski helmet prototype

Vilímovský, Daniel January 2021 (has links)
The diploma thesis is focused on the application of modern technologies in ski helmets development. In the theoretical part is performed the research of the protective gear for skiers including the characteristics of production technologies used for its production. Part of the thesis is also the characteristics of Reverse Engineering and Rapid Prototyping. The practical part deals with the design of the ski helmet using modeling clay with the following conversion to a computer model and editing in available CAx program. Part of the practical part is also production on 3D printer. The thesis is concluded with a technical-economic evaluation of applicated modern technologies used for prototype helmet model production.

Page generated in 0.1014 seconds