Sciweavers

61 search results - page 5 / 13
» Forensic engineering techniques for VLSI CAD tools
Sort
View
ICSEA
2006
IEEE
14 years 1 months ago
Analysing Countermeasures Against Privacy-Invasive Software
User privacy is widely affected by the occurrence of privacy-invasive software (PIS) on the Internet. Various forms of countermeasures try to mitigate the negative effects caused b...
Martin Boldt, Bengt Carlsson
CAD
2005
Springer
13 years 7 months ago
Frontal geometry from sketches of engineering objects: is line labelling necessary?
A tool which can quickly interpret line drawings (with hidden lines removed) of engineering objects as boundary representation CAD models would be of significant benefit in the pr...
P. A. C. Varley, Ralph R. Martin, Hiromasa Suzuki
DAC
2005
ACM
14 years 9 months ago
Freeze: engineering a fast repeater insertion solver for power minimization using the ellipsoid method
This paper presents a novel repeater insertion algorithm for the power minimization of realistic interconnect trees under given timing budgets. Our algorithm judiciously combines ...
Yuantao Peng, Xun Liu
PASTE
2010
ACM
14 years 1 months ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
PASTE
2005
ACM
14 years 1 months ago
String analysis for x86 binaries
Information about string values at key points in a program can help program understanding, reverse engineering, and forensics. We present a static-analysis technique for recoverin...
Mihai Christodorescu, Nicholas Kidd, Wen-Han Goh