Sciweavers

726 search results - page 128 / 146
» Reverse engineering: a roadmap
Sort
View
ESORICS
2008
Springer
13 years 11 months ago
Dismantling MIFARE Classic
The mifare Classic is a contactless smart card that is used extensively in access control for office buildings, payment systems for public transport, and other applications. We rev...
Flavio D. Garcia, Gerhard de Koning Gans, Ruben Mu...
FPL
2008
Springer
105views Hardware» more  FPL 2008»
13 years 11 months ago
Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems
A high-speed and secure dynamic partial reconfiguration (DPR) system is realized with AES-GCM that guarantees both confidentiality and authenticity of FPGA bitstreams. In DPR syst...
Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji T...
DAGSTUHL
2006
13 years 11 months ago
Rule-based Model Extraction from Source Code
Abstract. In the context of an approach for reengineering legacy software systems at the architectural level, we present in this paper a reverse engineering methodology that uses a...
Rui Correia, Carlos M. P. Matos, Mohammad El-Ramly...
APPINF
2003
13 years 11 months ago
Extracting High-level Architecture from Existing Code with Summary Models
Evolution of existing large telecommunications software currently became an important issue. Efficient methods are needed to componentize existing software identify existing compo...
Nikolai Mansurov, Djenana Campara
CASCON
1996
111views Education» more  CASCON 1996»
13 years 11 months ago
A hybrid process for recovering software architecture
A large portion of the software used in industry today is legacy software. Legacy systems often evolve into dicult to maintain systems whose original design has been lost or else ...
Vassilios Tzerpos, Richard C. Holt