نتایج جستجو برای: reverse engineering approachstate cancer

تعداد نتایج: 1258278  

2015
Fabian Weise

In this paper the different techniques of reverse engineering and hardware analysis are explained through the example of Atmel’s ATtiny13 microcontroller. Furthermore its protection against vulnerabilities is analyzed, how its fuse bit mechanism can be bypassed and a possibility to defend against such attacks on the software side. Finally, the legal regulations concerning reverse engineering of...

2013
Julien Pierre

Facing the problems of personal data industrialization, many technical and legal solutions have been proposed. Pro-privacy legislation and new design patterns try to make engineers and merchants more responsible. Although these efforts must be maintained from these actors, we believe that such a consideration for privacy, focused on commercial transactions, leaves the individual subjects and th...

2013
Jacco Krijnen

While reverse engineering probably started with the analysis of hardware, today it plays a significant role in the software world. We discuss some of its uses and explain security related issues like malicious software and software piracy. It is shown how tools such as disassemblers and decompilers can help in this process, and why it is difficult to completely protect software from being rever...

1999
Kenny Wong

Software must evolve over time or it becomes useless. Much of software production today is involved not in creating wholly new code from scratch but in maintaining and building upon existing code. Much of this code resides in old legacy software systems. Unfortunately, these systems are often poorly documented. Typically, they become more complex and difficult to understand over time. Thus, the...

2007
Nils Hasler Bodo Rosenhahn Hans-Peter Seidel

Segmenting garments from humanoid meshes or point clouds is a challenging problem with applications in the textile industry and in model based motion capturing. In this work we present a physically based template-matching technique for the automatic extraction of garment dimensions from 3D meshes or point clouds of dressed humans. The successfull identification of garment dimensions also allows...

2009
Dietmar Schütz

In the realm of Product Line Engineering (PLE), Variability Management is one of the key issues. The success of the whole product line approach relies on the correctness of the variability models. Unfortunately, before transiting to PLE, knowledge on the variability is not addressed explicitly, but embedded in many development artefacts. This pattern provides an approach to extract that hidden ...

2003
Fabrice Estiévenart Aurore François Jean Henrard Jean-Luc Hainaut

Modern technologies allow web sites to be dynamically managed by building pages on-the-fly through scripts that get data from a database. Dissociation of data from layout directives provides easy data update and homogeneous presentation. However, many web sites still are made of static HTML pages in which data and layout information are interleaved. This leads to out-of-date information, incons...

Journal: :Journal of Systems and Software 2005
Arie van Deursen Elizabeth Burd

Introduction Reverse engineering aims at obtaining high level representations of programs. Reverse engineers typically start with a low level representation of a system (such as binaries, plain source code, or execution traces), and try to distill more abstract representations from these (such as, for the examples just given, source code, architectural views, or use cases, respectively). Revers...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید