Sciweavers

726 search results - page 101 / 146
» Reverse engineering: a roadmap
Sort
View
SOFTVIS
2010
ACM
13 years 8 months ago
Visual comparison of software architectures
Reverse engineering methods produce different descriptions of software architectures. In this work we analyze and define the task of exploring and comparing these descriptions. ...
Fabian Beck, Stephan Diehl
FDTC
2010
Springer
124views Cryptology» more  FDTC 2010»
13 years 8 months ago
Optical Fault Masking Attacks
This paper introduces some new types of optical fault attacks called fault masking attacks. These attacks are aimed at disrupting of the normal memory operation through preventing ...
Sergei Skorobogatov
TCS
2011
13 years 4 months ago
An algorithmic framework for network reconstruction
Models of biological systems and phenomena are of high scientific interest and practical relevance, but not always easy to obtain due to their inherent complexity. To gain the re...
Markus Durzinsky, Annegret Wagler, Robert Weismant...

Publication
195views
12 years 8 months ago
Analog Genetic Encoding for the Evolution of Circuits and Networks
This paper describes a new kind of genetic representation called analog genetic encoding (AGE). The representation is aimed at the evolutionary synthesis and reverse engineering of...
Claudio Mattiussi, Dario Floreano
ESORICS
2012
Springer
12 years 9 days ago
Dismantling iClass and iClass Elite
With more than 300 million cards sold, HID iClass is one of the most popular contactless smart cards on the market. It is widely used for access control, secure login and payment s...
Flavio D. Garcia, Gerhard de Koning Gans, Roel Ver...