Sciweavers

677 search results - page 44 / 136
» Reverse Engineering
Sort
View
ACISICIS
2007
IEEE
14 years 2 months ago
Slicing Aided Design of Obfuscating Transforms
Abstract—An obfuscation aims to transform a program, without affecting its functionality, so that some secret information within the program can be hidden for as long as possible...
Stephen Drape, Anirban Majumdar, Clark D. Thombors...
OOPSLA
2001
Springer
14 years 12 days ago
A Categorization of Classes based on the Visualization of their Internal Structure: The Class Blueprint
The reengineering and reverse engineering of software systems is gaining importance in software industry, because the accelerated turnover in software companies creates legacy sys...
Michele Lanza, Stéphane Ducasse
HCI
2007
13 years 9 months ago
Musculoskeletal and Performance Effects of Monocular Display Augmented, Articulated Arm Based Laser Digitizing
Abstract. Processes of capturing solid geometry features as threedimensional data for analysis, simulation, or reverse engineering require the use of laser-based reverse engineerin...
Neil Littell, Kari Babski-Reeves, Gary McFadyen, J...
NDSS
2008
IEEE
14 years 2 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
ACMSE
2006
ACM
14 years 1 months ago
Some new approaches for preventing software tampering
In this paper, we propose several methods to increase the difficulty of reverse engineering applications, with special emphasis on preventing the circumvention of copy protection ...
Bin Fu, Golden G. Richard III, Yixin Chen