نتایج جستجو برای: reverse engineering approachstate cancer
تعداد نتایج: 1258278 فیلتر نتایج به سال:
In this paper the different techniques of reverse engineering and hardware analysis are explained through the example of Atmel’s ATtiny13 microcontroller. Furthermore its protection against vulnerabilities is analyzed, how its fuse bit mechanism can be bypassed and a possibility to defend against such attacks on the software side. Finally, the legal regulations concerning reverse engineering of...
Facing the problems of personal data industrialization, many technical and legal solutions have been proposed. Pro-privacy legislation and new design patterns try to make engineers and merchants more responsible. Although these efforts must be maintained from these actors, we believe that such a consideration for privacy, focused on commercial transactions, leaves the individual subjects and th...
While reverse engineering probably started with the analysis of hardware, today it plays a significant role in the software world. We discuss some of its uses and explain security related issues like malicious software and software piracy. It is shown how tools such as disassemblers and decompilers can help in this process, and why it is difficult to completely protect software from being rever...
Software must evolve over time or it becomes useless. Much of software production today is involved not in creating wholly new code from scratch but in maintaining and building upon existing code. Much of this code resides in old legacy software systems. Unfortunately, these systems are often poorly documented. Typically, they become more complex and difficult to understand over time. Thus, the...
Segmenting garments from humanoid meshes or point clouds is a challenging problem with applications in the textile industry and in model based motion capturing. In this work we present a physically based template-matching technique for the automatic extraction of garment dimensions from 3D meshes or point clouds of dressed humans. The successfull identification of garment dimensions also allows...
In the realm of Product Line Engineering (PLE), Variability Management is one of the key issues. The success of the whole product line approach relies on the correctness of the variability models. Unfortunately, before transiting to PLE, knowledge on the variability is not addressed explicitly, but embedded in many development artefacts. This pattern provides an approach to extract that hidden ...
Modern technologies allow web sites to be dynamically managed by building pages on-the-fly through scripts that get data from a database. Dissociation of data from layout directives provides easy data update and homogeneous presentation. However, many web sites still are made of static HTML pages in which data and layout information are interleaved. This leads to out-of-date information, incons...
Introduction Reverse engineering aims at obtaining high level representations of programs. Reverse engineers typically start with a low level representation of a system (such as binaries, plain source code, or execution traces), and try to distill more abstract representations from these (such as, for the examples just given, source code, architectural views, or use cases, respectively). Revers...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید