Sciweavers

181 search results - page 12 / 37
» Reverse Engineering Method Stereotypes
Sort
View
DAS
2006
Springer
13 years 10 months ago
XCDF: A Canonical and Structured Document Format
Accessing the structured content of PDF document is a difficult task, requiring pre-processing and reverse engineering techniques. In this paper, we first present different methods...
Jean-Luc Bloechle, Maurizio Rigamonti, Karim Hadja...
ISPASS
2007
IEEE
14 years 3 months ago
Reverse State Reconstruction for Sampled Microarchitectural Simulation
For simulation, a tradeoff exists between speed and accuracy. The more instructions simulated from the workload, the more accurate the results — but at a higher cost. To reduce ...
Paul D. Bryan, Michel C. Rosier, Thomas M. Conte
ACSW
2003
13 years 10 months ago
Provably Secure Key Exchange: An Engineering Approach
We promote an engineering approach to design of provably secure key exchange protocols. Using the model of Canetti and Krawczyk we present a systematic method to arrive at efficie...
Yiu Shing Terry Tin, Colin Boyd, Juanma Gonz&aacut...
ACMSE
2006
ACM
14 years 2 months ago
Some new approaches for preventing software tampering
In this paper, we propose several methods to increase the difficulty of reverse engineering applications, with special emphasis on preventing the circumvention of copy protection ...
Bin Fu, Golden G. Richard III, Yixin Chen
SCAM
2003
IEEE
14 years 2 months ago
Parse-Tree Annotations Meet Re-Engineering Concerns
We characterise a computational model for processing annotated parse trees. The model is basically rewriting-based with specific provisions for dealing with annotations along the...
Jan Kort, Ralf Lämmel